Search for vulnerabilities
Vulnerability details: VCID-bsmn-prby-aaan
Vulnerability ID VCID-bsmn-prby-aaan
Aliases CVE-2020-1597
GHSA-f8qx-mjcq-wfgx
Summary Improper Input Validation A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2020:3421
rhas Important https://access.redhat.com/errata/RHSA-2020:3422
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1597.json
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.01503 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.02417 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.02417 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.02417 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.02867 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.06435 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.08489 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
epss 0.26832 https://api.first.org/data/v1/epss?cve=CVE-2020-1597
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1861110
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-f8qx-mjcq-wfgx
cvssv3.1 7.5 https://github.com/dotnet/announcements/issues/162
generic_textual HIGH https://github.com/dotnet/announcements/issues/162
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2020-1597
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-1597
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-1597
cvssv3.1 7.5 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1597
generic_textual HIGH https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1597
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1597.json
https://api.first.org/data/v1/epss?cve=CVE-2020-1597
https://github.com/dotnet/announcements/issues/162
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1597
1861110 https://bugzilla.redhat.com/show_bug.cgi?id=1861110
cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVE-2020-1597 https://nvd.nist.gov/vuln/detail/CVE-2020-1597
GHSA-f8qx-mjcq-wfgx https://github.com/advisories/GHSA-f8qx-mjcq-wfgx
RHSA-2020:3421 https://access.redhat.com/errata/RHSA-2020:3421
RHSA-2020:3422 https://access.redhat.com/errata/RHSA-2020:3422
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1597.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/dotnet/announcements/issues/162
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-1597
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-1597
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-1597
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1597
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.87336
EPSS Score 0.01503
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.