Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13777

EPSS 1.52% · P81
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-13777

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GnuTLS 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GnuTLS是一款免费的用于实现SSL、TLS和DTLS协议的安全通信库。 GnuTLS 3.6.14版本中存在加密问题漏洞。攻击者可通过实施中间人攻击利用该漏洞绕过TLS 1.3版本的身份验证并恢复TLS 1.2版本的先前会话。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-13777

#POC DescriptionSource LinkShenlong Link
1Zeek script to detect servers vulnerable to CVE-2020-13777https://github.com/0xxon/cve-2020-13777POC Details
2Challange CVE-2020-13777 https://github.com/shigeki/challenge_CVE-2020-13777POC Details
3Nonehttps://github.com/prprhyt/PoC_TLS1_3_CVE-2020-13777POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-13777

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-06-04 · 94 CVEs total

CVE-2019-20815Foxit PhantomPDF 资源管理错误漏洞
CVE-2019-20818Foxit Reader和PhantomPDF 资源管理错误漏洞
CVE-2019-20820Foxit Reader 和 Foxit PhantomPDF 代码问题漏洞
CVE-2018-21244Foxit PhantomPDF 代码问题漏洞
CVE-2018-21243Foxit PhantomPDF 代码问题漏洞
CVE-2018-21242Foxit PhantomPDF 信息泄露漏洞
CVE-2018-21241Foxit PhantomPDF 代码问题漏洞
CVE-2018-21240Foxit Reader和PhantomPDF 资源管理错误漏洞
CVE-2020-9462Athom Homey 安全漏洞
CVE-2019-20816Foxit PhantomPDF 代码问题漏洞
CVE-2019-20817Foxit Reader和PhantomPDF 代码问题漏洞
CVE-2019-20814Foxit PhantomPDF 资源管理错误漏洞
CVE-2019-20813Foxit PhantomPDF 代码问题漏洞
CVE-2020-13815Foxit Reader和Foxit PhantomPDF 资源管理错误漏洞
CVE-2020-13814Foxit Reader和PhantomPDF 资源管理错误漏洞
CVE-2020-13813Foxit Studio Photo 代码问题漏洞
CVE-2019-16384Cybele Software Thinfinity VirtualUI 路径遍历漏洞
CVE-2019-16385Cybele Software Thinfinity VirtualUI 跨站脚本漏洞
CVE-2020-13812Foxit Studio Photo 代码问题漏洞
CVE-2020-13765QEMU 缓冲区错误漏洞

Showing top 20 of 94 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-13777

No comments yet


Leave a comment