Description
<p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.</p> <p>To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer.</p> <p>The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.</p>
Exploits (14)
nomisec
WORKING POC
209 stars
by advanced-threat-research · poc
https://github.com/advanced-threat-research/CVE-2020-16898
References (1)
Core 1
Core References
Patch, Vendor Advisory x_refsource_misc
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898
Scores
CVSS v3
8.8
EPSS
0.3269
EPSS Percentile
96.9%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
Status
published
Products (10)
microsoft/windows_10
1709
microsoft/windows_10
1803
microsoft/windows_10
1809
microsoft/windows_10
1903
microsoft/windows_10
1909
microsoft/windows_10
2004
microsoft/windows_server_2016
1903
microsoft/windows_server_2016
1909
microsoft/windows_server_2016
2004
microsoft/windows_server_2019
Published
Oct 16, 2020
Tracked Since
Feb 18, 2026