CVE-2020-8620 vulnerability in ISC and Other Products
Published on August 21, 2020
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
Vulnerability Analysis
CVE-2020-8620 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH
Products Associated with CVE-2020-8620
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-8620 are published in these products:
Affected Versions
ISC BIND9:- Version 9.15.6 and below * is affected.
Exploit Probability
EPSS
7.29%
Percentile
91.49%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.