CVE-2020-13597

ADVISORY - github

Summary

Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod.

EPSS Score: 0.00214 (0.437)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Exposure of Sensitive Information to an Unauthorized Actor

Insertion of Sensitive Information Into Sent Data

ADVISORY - github

Exposure of Sensitive Information to an Unauthorized Actor

Insertion of Sensitive Information Into Sent Data

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Exposure of Sensitive Information to an Unauthorized Actor

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in