Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2020-8284

Disclosure Date: December 14, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
3.7 Low
Impact Score:
1.4
Exploitability Score:
2.2
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
Low
Integrity (I):
None
Availability (A):
None

General Information

Vendors

  • apple,
  • debian,
  • fedoraproject,
  • fujitsu,
  • haxx,
  • netapp,
  • oracle,
  • siemens,
  • splunk

Products

  • clustered data ontap -,
  • communications billing and revenue management 12.0.0.3.0,
  • communications cloud native core policy 1.14.0,
  • curl,
  • debian linux 10.0,
  • debian linux 9.0,
  • essbase 21.2,
  • fedora 32,
  • fedora 33,
  • hci bootstrap os -,
  • hci management node -,
  • hci storage node -,
  • m10-1 firmware,
  • m10-4 firmware,
  • m10-4s firmware,
  • m12-1 firmware,
  • m12-2 firmware,
  • m12-2s firmware,
  • mac os x,
  • mac os x 10.14.6,
  • mac os x 10.15.7,
  • macos 11.0.1,
  • macos 11.1,
  • macos 11.2,
  • peoplesoft enterprise peopletools 8.58,
  • sinec infrastructure network services,
  • solidfire -,
  • universal forwarder,
  • universal forwarder 9.1.0
Technical Analysis