[Amnesia:33](<https://www.forescout.com/company/resources/amnesia33-how-tcp-ip-stacks-breed-critical-vulnerabilities-in-iot-ot-and-it-devices/>) is a group of 33 vulnerabilities in open-source TCP/IP stack libraries. The vulnerabilities may be present in a wide range of operational technology, IoT, and connected device implementations.
**Recent assessments:**
**ccondon-r7** at December 08, 2020 9:05pm UTC reported:
Sorta relying here on the fact that memory corruption vulns are difficult to weaponize or even trigger reliably, and it sounds like there will be lots of different implementations of the vulnerable libraries, so uniform attack surface area is going to be scarce. Rapid7’s IoT research lead noted as well that TCP stack issues like this may well require the attacker to be on same subnet, and it’s unlikely that upstream routers would accept unexpected/malformed packets. There’ll be lots of fragmented vendor advisories trickling out in bits, I’d expect. There may be more detail out on which to base assessments later this week.
Assessed Attacker Value: 2
Assessed Attacker Value: 2Assessed Attacker Value: 0
{"id": "AKB:D06E04AB-0FFE-4CE4-A29C-24BC05F6E804", "type": "attackerkb", "bulletinFamily": "info", "title": "Amnesia:33", "description": "[Amnesia:33](<https://www.forescout.com/company/resources/amnesia33-how-tcp-ip-stacks-breed-critical-vulnerabilities-in-iot-ot-and-it-devices/>) is a group of 33 vulnerabilities in open-source TCP/IP stack libraries. The vulnerabilities may be present in a wide range of operational technology, IoT, and connected device implementations.\n\n \n**Recent assessments:** \n \n**ccondon-r7** at December 08, 2020 9:05pm UTC reported:\n\nSorta relying here on the fact that memory corruption vulns are difficult to weaponize or even trigger reliably, and it sounds like there will be lots of different implementations of the vulnerable libraries, so uniform attack surface area is going to be scarce. Rapid7\u2019s IoT research lead noted as well that TCP stack issues like this may well require the attacker to be on same subnet, and it\u2019s unlikely that upstream routers would accept unexpected/malformed packets. There\u2019ll be lots of fragmented vendor advisories trickling out in bits, I\u2019d expect. There may be more detail out on which to base assessments later this week.\n\nAssessed Attacker Value: 2 \nAssessed Attacker Value: 2Assessed Attacker Value: 0\n", "published": "2020-12-08T00:00:00", "modified": "2020-12-08T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://attackerkb.com/topics/UBfm95fV8w/amnesia-33/rapid7-analysis", "reporter": "AttackerKB", "references": ["https://www.forescout.com/company/resources/amnesia33-how-tcp-ip-stacks-breed-critical-vulnerabilities-in-iot-ot-and-it-devices/"], "cvelist": ["CVE-2020-24336", "CVE-2020-24338", "CVE-2020-25111", "CVE-2020-25112"], "immutableFields": [], "lastseen": "2021-10-28T01:54:23", "viewCount": 10, "enchantments": {"dependencies": {"references": [{"type": "cert", "idList": ["VU:815128"]}, {"type": "cve", "idList": ["CVE-2020-24336", "CVE-2020-24338", "CVE-2020-25111", "CVE-2020-25112"]}, {"type": "ics", "idList": ["ICSA-20-343-01"]}, {"type": "thn", "idList": ["THN:812B2C8E4446362B541FFE932E10CC78"]}], "rev": 4}, "score": {"value": 1.9, "vector": "NONE"}, "backreferences": {"references": [{"type": "cert", "idList": ["VU:815128"]}, {"type": "cve", "idList": ["CVE-2020-24336", "CVE-2020-24338", "CVE-2020-25111", "CVE-2020-25112"]}, {"type": "thn", "idList": ["THN:812B2C8E4446362B541FFE932E10CC78"]}]}, "exploitation": null, "vulnersScore": 1.9}, "attackerkb": {"attackerValue": 2, "exploitability": 0}, "wildExploited": false, "wildExploitedCategory": {}, "wildExploitedReports": [], "references_categories": {"Canonical": ["https://www.forescout.com/company/resources/amnesia33-how-tcp-ip-stacks-breed-critical-vulnerabilities-in-iot-ot-and-it-devices/"]}, "tags": ["difficult_to_develop"], "mitre_vector": {}, "last_activity": "2020-12-08T21:05:00", "_state": {"wildexploited": 1647356732, "dependencies": 1645909612, "score": 1659842276}, "_internal": {"wildexploited_cvelist": null, "score_hash": "587ef82ef16402942cf8205fc1a8de70"}}
{"thn": [{"lastseen": "2022-05-09T12:38:42", "description": "[](<https://thehackernews.com/images/-wmhhLqsmP70/X9CdE443IiI/AAAAAAAABNA/_rti_SS4BkoWeh8I0g7GiKTZGzH1f7n4QCLcBGAsYHQ/s0/iot-hack.jpg>)\n\nCybersecurity researchers disclosed a dozen new flaws in multiple widely-used embedded TCP/IP stacks impacting millions of devices ranging from networking equipment and medical devices to industrial control systems that could be exploited by an attacker to take control of a vulnerable system.\n\nCollectively called \"[AMNESIA:33](<https://www.forescout.com/research-labs/amnesia33/>)\" by Forescout researchers, it is a set of 33 vulnerabilities that impact four open-source TCP/IP protocol stacks \u2014 uIP, FNET, picoTCP, and Nut/Net \u2014 that are commonly used in Internet-of-Things (IoT) and embedded devices.\n\nAs a consequence of improper memory management, [successful exploitation](<https://kb.cert.org/vuls/id/815128>) of these flaws could cause memory corruption, allowing attackers to compromise devices, execute malicious code, perform denial-of-service (DoS) attacks, steal sensitive information, and even poison DNS cache.\n\nIn the real world, these attacks could play out in various ways: disrupting the functioning of a power station to result in a blackout or taking smoke alarm and temperature monitor systems offline by using any of the DoS vulnerabilities.\n\nThe flaws, which will be detailed today at the [Black Hat Europe Security Conference](<https://www.blackhat.com/eu-20/briefings/schedule/index.html#how-embedded-tcpip-stacks-breed-critical-vulnerabilities-21503>), were discovered as part of Forescout's Project Memoria initiative to study the security of TCP/IP stacks.\n\n[](<https://thehackernews.com/images/-MEwJ7pVxyWs/X9CaX-0BcuI/AAAAAAAABMs/i407DFI0niYEMuWAiPHTc7lFa1enTZCxgCLcBGAsYHQ/s0/iot-devices.jpg>)\n\nThe development has prompted the CISA ICS-CERT to issue a [security advisory](<https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01>) in an attempt to provide early notice of the reported vulnerabilities and identify baseline preventive measures for mitigating risks associated with the flaws.\n\nMillions of devices from an estimated 158 vendors are vulnerable to AMNESIA:33, with the possibility of remote code execution allowing an adversary to take complete control of a device, and using it as an entry point on a network of IoT devices to laterally move, establish persistence, and co-opt the compromised systems into botnets without their knowledge.\n\n\"AMNESIA:33 affects multiple open source TCP/IP stacks that are not owned by a single company,\" the researchers [said](<https://www.forescout.com/company/resources/amnesia33-how-tcp-ip-stacks-breed-critical-vulnerabilities-in-iot-ot-and-it-devices/>). \"This means that a single vulnerability tends to spread easily and silently across multiple codebases, development teams, companies and products, which presents significant challenges to patch management.\"\n\nBecause these vulnerabilities span across a complex IoT supply chain, Forescout cautioned it's as challenging it is to determine which devices are affected as they are hard to eradicate.\n\nLike the [Urgent/11](<https://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html>) and [Ripple20](<https://thehackernews.com/2020/06/new-critical-flaws-put-billions-of.html>) flaws that were disclosed in recent times, AMNESIA:33 stems from [out-of-bounds writes](<https://cwe.mitre.org/data/definitions/787.html>), [overflow flaws](<https://cwe.mitre.org/data/definitions/190.html>), or a [lack of input validation](<https://cwe.mitre.org/data/definitions/20.html>), leading to memory corruption and enabling an attacker to put devices into infinite loops, poison DNS caches, and extract arbitrary data.\n\nThree of the most severe issues reside in uIP (CVE-2020-24336), picoTCP (CVE-2020-24338), and Nut/Net (CVE-2020-25111), all of which are remote code execution (RCE) flaws and have a CVSS score of 9.8 out of a maximum of 10.\n\n * **CVE-2020-24336** \\- The code for parsing DNS records in DNS response packets sent over NAT64 does not validate the length field of the response records, allowing attackers to corrupt memory.\n * **CVE-2020-24338** \\- The function that parses domain names lacks bounds checks, allowing attackers to corrupt memory with crafted DNS packets.\n * **CVE-2020-25111** \\- A heap buffer overflow occurring during the processing of the name field of a DNS response resource record, allowing an attacker to corrupt adjacent memory by writing an arbitrary number of bytes to an allocated buffer.\n\nAs of writing, vendors such as [Microchip Technology](<https://www.microchip.com/design-centers/wireless-connectivity/software-vulnerability-response/amnesia-network-stack-vulnerability>) and [Siemens](<https://cert-portal.siemens.com/productcert/pdf/ssa-541017.pdf>) that have been affected by the reported vulnerabilities have also released security advisories.\n\n\"Embedded systems, such as IoT and [operational technology] devices, tend to have long vulnerability lifespans resulting from a combination of patching issues, long support lifecycles and vulnerabilities 'trickling down' highly complex and opaque supply chains,\" Forescout said.\n\n\"As a result, vulnerabilities in embedded TCP/IP stacks have the potential to affect millions \u2013 even billions \u2013 of devices across verticals and tend to remain a problem for a very long time.\"\n\nBesides urging organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures, CISA has recommended minimizing network exposure, isolating control system networks and remote devices behind firewalls, and using Virtual Private Networks (VPNs) for secure remote access.\n\n \n\n\nFound this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter _\uf099_](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-09T09:50:00", "type": "thn", "title": "Amnesia:33 \u2014 Critical TCP/IP Flaws Affect Millions of IoT Devices", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-24336", "CVE-2020-24338", "CVE-2020-25111"], "modified": "2020-12-10T16:36:49", "id": "THN:812B2C8E4446362B541FFE932E10CC78", "href": "https://thehackernews.com/2020/12/amnesia33-critical-tcpip-flaws-affect.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T15:40:48", "description": "An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-11T23:15:00", "type": "cve", "title": "CVE-2020-25112", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-25112"], "modified": "2020-12-14T21:18:00", "cpe": ["cpe:/o:contiki-os:contiki-os:3.0"], "id": "CVE-2020-25112", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25112", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:contiki-os:contiki-os:3.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T15:40:46", "description": "An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-11T23:15:00", "type": "cve", "title": "CVE-2020-25111", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-25111"], "modified": "2020-12-15T02:01:00", "cpe": ["cpe:/o:contiki-os:contiki-os:3.0"], "id": "CVE-2020-25111", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25111", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:contiki-os:contiki-os:3.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T15:22:37", "description": "An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-11T23:15:00", "type": "cve", "title": "CVE-2020-24338", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-24338"], "modified": "2020-12-14T21:40:00", "cpe": ["cpe:/a:altran:picotcp:1.7.0"], "id": "CVE-2020-24338", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24338", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:altran:picotcp:1.7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T15:22:34", "description": "An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-11T23:15:00", "type": "cve", "title": "CVE-2020-24336", "cwe": ["CWE-120"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-24336"], "modified": "2020-12-15T14:47:00", "cpe": ["cpe:/o:contiki-os:contiki:3.0", "cpe:/o:contiki-ng:contiki-ng:4.5"], "id": "CVE-2020-24336", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24336", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:contiki-os:contiki:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:contiki-ng:contiki-ng:4.5:*:*:*:*:*:*:*"]}], "ics": [{"lastseen": "2022-04-26T21:49:04", "description": "## 1\\. EXECUTIVE SUMMARY\n\n * **CVSS v3 9.8**\n * **ATTENTION:** Exploitable remotely/low skill level to exploit\n * **Vendor: **Multiple (open source)\n * **Equipment:** uIP-Contiki-OS, uIP-Contiki-NG, uIP, open-iscsi, picoTCP-NG, picoTCP, FNET, Nut/Net\n * **Vulnerabilities:** Infinite Loop, Integer Wraparound, Out-of-bounds Read, Integer Overflow, Out-of-bounds Write, Improper Input Validation, Improper Null Termination\n\nCISA is aware of a public report, known as \u201cAMNESIA:33\u201d that details vulnerabilities found in multiple open-source TCP/IP stacks. CISA is issuing this advisory to provide early notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.\n\nThe various open-source stacks may be implemented in forked repositories.\n\n## 2\\. RISK EVALUATION\n\nSuccessful exploitation of these vulnerabilities could allow attackers to corrupt memory, put devices into infinite loops, access unauthorized data, and/or poison DNS cache.\n\n## 3\\. TECHNICAL DETAILS\n\n### 3.1 AFFECTED PRODUCTS\n\nThe following are affected:\n\n * uIP-Contiki-OS (end-of-life [EOL]), Version 3.0 and prior\n * uIP-Contiki-NG, Version 4.5 and prior\n * uIP (EOL), Version 1.0 and prior\n * open-iscsi, Version 2.1.12 and prior\n * picoTCP-NG, Version 1.7.0 and prior\n * picoTCP (EOL), Version 1.7.0 and prior\n * FNET, Version 4.6.3\n * Nut/Net, Version 5.1 and prior\n\n### 3.2 VULNERABILITY OVERVIEW\n\n#### 3.2.1 [LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835](<https://cwe.mitre.org/data/definitions/835.html>)\n\nThe function used in uIP-Contiki-OS to process IPv6 extension headers and extension header options can be forced into an infinite loop state due to unchecked header/option lengths.\n\n[CVE-2020-13984](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13984>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.2 [INTEGER WRAPAROUND CWE-190](<https://cwe.mitre.org/data/definitions/190.html>)\n\nThe function used in uIP-Contiki-OS to decapsulate RPL extension headers does not check for unsafe integer conversion when parsing the values provided in a header, allowing an attacker to corrupt memory. \n\n[CVE-2020-13985](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13985>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.3 [LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835](<https://cwe.mitre.org/data/definitions/835.html>)\n\nThe function used in uIP-Contiki-OS to decapsulate RPL extension headers does not check the length value of an RPL extension header received, allowing an attacker to cause it to enter an infinite loop.\n\n[CVE-2020-13986](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13986>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.4 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in open-iscsi, uIP-Contiki-OS, and uIP that parses incoming transport layer packets (TCP/UDP) does not check the length fields of packet headers against the data available in the packets. Given arbitrary lengths, an out-of-bounds memory read may be performed during the checksum computation.\n\n[CVE-2020-13987](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13987>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.5 [INTEGER OVERFLOW CWE-190](<https://cwe.mitre.org/data/definitions/190.html>)\n\nThe function in open-iscsi, uIP-Contiki-OS, and uIP that parses the TCP MSS option does not check the validity of the length field of this option, allowing an attacker to force it into an infinite loop when arbitrary TCP MSS values are supplied.\n\n[CVE-2020-13988](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13988>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.6 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nWhen handling TCP urgent data in open-iscsi, uIP-Contiki-OS, and uIP, there are no sanity checks for the value of the urgent data pointer, allowing an attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets.\n\n[CVE-2020-17437](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17437>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H>)).\n\n#### 3.2.7 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nThe function in open-iscsi and uIP that reassembles fragmented packets does not validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. This could lead to memory corruption.\n\n[CVE-2020-17438](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17438>) has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is ([AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H>)).\n\n#### 3.2.8 [IMPROPER INPUT VALIDATION CWE-20](<https://cwe.mitre.org/data/definitions/20.html>)\n\nIncoming DNS replies in uIP are parsed by the DNS client even if there were no outgoing queries. The DNS transaction ID is not sufficiently random. Provided that the DNS cache is quite small (four entries), this facilitates DNS cache poisoning attacks.\n\n[CVE-2020-17439](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17439>) has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is ([AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L>)).\n\n#### 3.2.9 [IMPROPER NULL TERMINATION CWE-170](<https://cwe.mitre.org/data/definitions/170.html>)\n\nWhen parsing incoming DNS packets in uIP-Contiki-NG, uIP-Contiki-OS, and uIP, there are no checks whether domain names are null-terminated. This allows an attacker to achieve memory corruption with crafted DNS responses.\n\n[CVE-2020-17440](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17440>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.10 [IMPROPER INPUT VALIDATION CWE-20](<https://cwe.mitre.org/data/definitions/20.html>)\n\nIn picoTCP-NG and picoTCP the payload length field of IPv6 extension headers are not checked against the data available in incoming packets, allowing an attacker to corrupt memory.\n\n[CVE-2020-17441](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17441>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.11 [INTEGER OVERFLOW CWE-190](<https://cwe.mitre.org/data/definitions/190.html>)\n\nThe function in picoTCP-NG and picoTCP that processes the hop-by-hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing an attacker to cause the function to enter an infinite loop by supplying arbitrary length values.\n\n[CVE-2020-17442](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17442>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.12 [INTEGER OVERFLOW CWE-190](<https://cwe.mitre.org/data/definitions/190.html>)\n\nWhen processing ICMPv6 echo requests in picoTCP-NG and picoTCP, there are no checks for whether the ICMPv6 header consists of at least 8 bytes (set by RFC443). This leads to the function that creates ICMPv6 echo replies based on a received request with a smaller header to corrupt memory.\n\n[CVE-2020-17443](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17443>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.13 [INTEGER OVERFLOW CWE-190](<https://cwe.mitre.org/data/definitions/190.html>)\n\nThe function in picoTCP-NG and picoTCP that processes IPv6 headers does not check the lengths of extension header options, allowing an attacker to force this function into an infinite loop with crafted length values.\n\n[CVE-2020-17444](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17444>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.14 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in picoTCP-NG and picoTCP that processes the IPv6 destination options extension header does not check the validity of its options lengths, allowing an attacker to corrupt memory and/or put the function into an infinite loop with crafted length values.\n\n[CVE-2020-17445](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17445>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.15 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in FNET does not check whether domain names are null terminated when parsing Link-local Multicast Name Resolution (LLMNR) requests. This may allow an attacker to read out of bounds.\n\n[CVE-2020-17467](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17467>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.16 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in FNET that processes the IPv6 hop-by-hop extension header does not check the validity of its options lengths, allowing an attacker to corrupt memory.\n\n[CVE-2020-17468](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17468>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.17 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe IPv6 packet reassembly function in FNET does not check whether the received fragments are properly aligned in memory, allowing an attacker to perform memory corruption with crafted IPv6 fragmented packets.\n\n[CVE-2020-17469](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17469>) has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is ([AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.18 [IMPROPER INPUT VALIDATION CWE-20](<https://cwe.mitre.org/data/definitions/20.html>)\n\nThe function in FNET that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they will be always set to 1), facilitating DNS cache poisoning attacks.\n\n[CVE-2020-17470](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17470>) has been assigned to this vulnerability. A CVSS v3 base score of 4.0 has been calculated; the CVSS vector string is ([AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N>)).\n\n#### 3.2.19 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in uIP-Contiki-NG, uIP-Contiki-OS, and uIP that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, which may allow an attacker to corrupt memory.\n\n[CVE-2020-24334](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24334>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.20 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in uIP-Contiki-NG, uIP-Contiki-OS, and uIP that parses domain names lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.\n\n[CVE-2020-24335](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24335>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.21 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in uIP-Contiki-NG and uIP-Contiki-OS for parsing DNS records in DNS response packets sent over NAT64 does not validate the length field of the response records, allowing an attacker to corrupt memory.\n\n[CVE-2020-24336](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24336>) has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.22 [LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835](<https://cwe.mitre.org/data/definitions/835.html>)\n\nThe function in picoTCP-NG and picoTCP that processes TCP options does not validate their lengths, allowing an attacker to put the function into an infinite loop with uncommon/unsupported TCP options that have crafted length values.\n\n[CVE-2020-24337](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24337>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.23 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nThe function in picoTCP and picoTCP-NG that parses domain names lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.\n\n[CVE-2020-24338](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24338>) has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.24 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in picoTCP and picoTCP-NG that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, allowing an attacker to perform memory corruption.\n\n[CVE-2020-24339](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24339>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.25 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in picoTCP and picoTCP-NG that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, allowing an attacker to perform memory corruption.\n\n[CVE-2020-24340](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24340>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.26 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe TCP input data processing function in picoTCP-NG and picoTCP does not validate the length of incoming TCP packets, allowing an attacker to read out of bounds and perform memory corruption.\n\n[CVE-2020-24341](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24341>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.27 [IMPROPER NULL TERMINATION CWE-170](<https://cwe.mitre.org/data/definitions/170.html>)\n\nWhen parsing incoming DNS packets in FNET, there are no checks whether domain names are null-terminated. This may allow an attacker to achieve memory corruption and/or memory leak.\n\n[CVE-2020-24383](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24383>) has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L>)).\n\n#### 3.2.28 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.\n\n[CVE-2020-25107](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25107>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.29 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nThe function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.\n\n[CVE-2020-25108](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25108>) has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H>)).\n\n#### 3.2.30 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.\n\n[CVE-2020-25109](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25109>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.31 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.\n\n[CVE-2020-25110](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25110>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>)).\n\n#### 3.2.32 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nThe function in Nut/Net that processes DNS questions/responses has several issues: there is no check on whether a domain name is NULL-terminated; the DNS response data length is not checked (can be set to arbitrary value from a packet); the number of DNS queries/responses (set in DNS header) is not checked against the data present; the length byte of a domain name in a DNS query/response is not checked and is used for internal memory operations.\n\n[CVE-2020-25111](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25111>) has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.33 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nVulnerabilities in uIP-Contiki-OS (EOL) provide insufficient checks for the IPv4/IPv6 header length and inconsistent checks for the IPv6 header extension lengths, which may allow an attacker to corrupt memory.\n\n[CVE-2020-25112](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25112>) has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is ([AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n### 3.3 BACKGROUND\n\n * **CRITICAL INFRASTRUCTURE SECTORS: **Multiple\n * **COUNTRIES/AREAS DEPLOYED: **Worldwide\n * **COMPANY HEADQUARTERS LOCATION:** Various\n\n### 3.4 RESEARCHER\n\nDaniel dos Santos, Stanislav Dashevskyi, Jos Wetzels, and Amine Amri of Forescout Research Labs reported these vulnerabilities to CISA.\n\n## 4\\. MITIGATIONS\n\n * uIP is EOL (end-of-life). See general recommendations below. \n * uIP-Contiki-OS is EOL. See general recommendations below.\n * picoTCP is EOL. See general recommendations below.\n * The maintainers of FNET recommend users update to [Version 4.7.0 or later](<https://github.com/butok/FNET/releases/tag/v4.7.0>). \n * The maintainers of uIP-Contiki-NG recommend users update to [the latest version](<https://github.com/contiki-ng/contiki-ng>).\n * The maintainers of open-iscsi recommend users update to [the latest version](<https://github.com/open-iscsi/open-iscsi>).\n * [Contact](<mailto:root@danielinux.net>) the maintainers of picoTCP-NG for recommended updates.\n * [Contact](<mailto:tim.schendekehl@egnite.de>) the maintainers of Nut/Net and find [the latest version on their websit](<http://www.ethernut.de/en/download/index.html>)e.\n\nAdditional vendors affected by the reported vulnerabilities have also released security advisories related to their affected products. Those advisories are as follows:\n\n * [Devolo](<https://www.devolo.de/fileadmin/Web-Content/DE/support/security/dSA201101-uIP_Stack-Security_Advisory.pdf>)\n * [EMU Electronic AG](<https://www.emuag.ch/support/vulnerability/emu-sec20201201/>)\n * [FEIG](<http://www.feig.de/service/cybersecurity/2020-12-08-01_SecurityAdvisory.pdf>)\n * [Genetec](<https://resources.genetec.com/security-advisories/vulnerabilities-affecting-the-sharpx-sharpxs-and-sharpz3>)\n * [Harting](<https://harting.sharefile.eu/share/view/45b5ca131e574842/fod2c891-c568-4690-becd-988867bf4dfb>)\n * [Hensoldt](<https://hensoldt-cyber.com/notifications/amnesia-33/>)\n * [Microchip](<https://www.microchip.com/design-centers/wireless-connectivity/software-vulnerability-response/amnesia-network-stack-vulnerability>)\n * [Nanotec](<https://en.nanotec.com/products/manual/N5_ECAT_EN?cHash=1b11e7dd4167bdbb93ee8d41de847565%20and%20https://en.nanotec.com/products/manual/N5_CAN_EN?cHash=57c3a0ea453f7c3bc9f2f33e93929599>)\n * [NT-Ware](<https://www.uniflow.global/en/security/security-and-maintenance/#security_advisory_8>)\n * [Tagmaster](<https://tagmaster.com/wp-content/uploads/2020/12/1120-213-Security-Advisory-NuttX-TCP-IP-vulnerabilities.pdf>)\n * [Siemens](<https://cert-portal.siemens.com/productcert/pdf/ssa-541017.pdf>)\n * [Uniflow](<https://www.uniflow.global/en/security/security-and-maintenance/#security_advisory_8>)\n * [Yanzi Networks](<https://yanzi.dev/#/security/advisories/2020-12-08>)\n\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:\n\n * Minimize network exposure for all control system devices and/or systems, and ensure that they are [not accessible from the Internet](<https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01>).\n * Locate control system networks and remote devices behind firewalls, and isolate them from the business network.\n * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.\n * Use an internal DNS server that performs DNS-over-HTTPS for lookups.\n\nCISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. \n \nCISA also provides a section for [control systems security recommended practices](<https://us-cert.cisa.gov/ics/recommended-practices>) on the ICS webpage on [us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>). Several recommended practices are available for reading and download, including [Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies](<https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf>).\n\nAdditional mitigation guidance and recommended practices are publicly available on the [ICS webpage on us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>) in the Technical Information Paper, [ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies](<https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B>). \n \nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.\n\nNo known public exploits specifically target these vulnerabilities. \n\n## \nContact Information\n\nFor any questions related to this report, please contact the CISA at: \n \nEmail: [CISAservicedesk@cisa.dhs.gov](<mailto:cisaservicedesk@cisa.dhs.gov>) \nToll Free: 1-888-282-0870\n\nFor industrial control systems cybersecurity information: https://us-cert.cisa.gov/ics \nor incident reporting: https://us-cert.cisa.gov/report\n\nCISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.\n\nThis product is provided subject to this Notification and this [Privacy & Use](<https://www.dhs.gov/privacy-policy>) policy.\n\n**Please share your thoughts.**\n\nWe recently updated our anonymous [product survey](<https://www.surveymonkey.com/r/CISA-cyber-survey?product=https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01>); we'd welcome your feedback.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T00:00:00", "type": "ics", "title": "Multiple Embedded TCP/IP Stacks", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-13984", "CVE-2020-13985", "CVE-2020-13986", "CVE-2020-13987", "CVE-2020-13988", "CVE-2020-17437", "CVE-2020-17438", "CVE-2020-17439", "CVE-2020-17440", "CVE-2020-17441", "CVE-2020-17442", "CVE-2020-17443", "CVE-2020-17444", "CVE-2020-17445", "CVE-2020-17467", "CVE-2020-17468", "CVE-2020-17469", "CVE-2020-17470", "CVE-2020-24334", "CVE-2020-24335", "CVE-2020-24336", "CVE-2020-24337", "CVE-2020-24338", "CVE-2020-24339", "CVE-2020-24340", "CVE-2020-24341", "CVE-2020-24383", "CVE-2020-25107", "CVE-2020-25108", "CVE-2020-25109", "CVE-2020-25110", "CVE-2020-25111", "CVE-2020-25112"], "modified": "2020-12-09T00:00:00", "id": "ICSA-20-343-01", "href": "https://www.us-cert.gov/ics/advisories/icsa-20-343-01", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cert": [{"lastseen": "2022-02-01T00:00:00", "description": "### Overview\n\nMultiple open-source embedded TCP/IP stacks, commonly used in Internet of Things (IoT) and embedded devices, have several vulnerabilities stemming from improper memory management. These vulnerabilities are also tracked as ICS-VU-633937 and JVNVU#96491057 as well as the name [AMNESIA:33](<https://www.forescout.com/research-labs/amnesia33/>).\n\n### Description\n\nEmbedded TCP/IP stacks provide essential network communication capability using TCP/IP networking to many lightweight operating systems adopted by IoT and other embedded devices. These software stacks can also be used in the latest technologies such as [Edge Computing](<https://en.wikipedia.org/wiki/Edge_computing>). The following embedded TCP/IP stacks were discovered to have 33 memory related vulnerabilities included in this advisory:\n\n * uIP: <https://github.com/adamdunkels/uip>\n * Contiki-OS and Contiki-NG: <https://www.contiki-ng.org/>\n * PicoTCP and PicoTCP-NG: <http://picotcp.altran.be>\n * FNET: [http://fnet.sourceforge.net/](<http://fnet.sourceforge.net/\\]>)\n * Nut/OS: <http://www.ethernut.de/en/software/>\n\nThese networking software stacks can be integrated in various ways, including compiled from source, modified and integrated, and linked as a dynamic or static libraries, allowing for a wide variety of implementations. As an example, projects such as [Apache Nuttx](<https://nuttx.apache.org>) and [open-iscsi](<https://www.open-iscsi.com>) have adopted common libraries and software modules, thus inheriting some of these vulnerabilities with varying levels of impact. The diversity of implementations and the lack of supply chain visibility has made it difficult to accurately assess the impact, usage as well as the potential exploitability of these vulnerabilities.\n\nIn general, most of these vulnerabilities are caused by [memory management bugs](<https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=87152142>), commonly seen in lightweight software implementations in Real Time Operating Systems (RTOS) and IoT devices. For specific details on these vulnerabilities, see the [Forescout advisory](<https://www.forescout.com/amnesia33>) that provides technical details. Due to the lack of visibility of these software usage, Forescout has released an open source version of [Detector](<https://github.com/Forescout/project-memoria-detector>) that can be used to identify potentially vulnerable software.\n\n### Impact\n\nThe impact of these vulnerabilities vary widely due to the combination of build and runtime options customized while including these in embedded devices. In summary, a remote, unauthenticated attacker may be able to use specially-crafted network packets to cause the vulnerable device to behave in unexpected ways such as a failure (denial of service), disclosure of private information, or execution of arbitrary code.\n\n### Solution\n\n#### Apply updates\n\nUpdate to the latest stable version of the affected embedded TCP/IP software that address these recently disclosed vulnerabilities. If you have adopted this software from an upstream provider, contact the provider to get appropriate updates that need to be integrated into your software. Concerned end-users of IoT and embedded devices that implement these vulnerable TCP/IP software stacks should contact their vendor or the closest reseller to obtain appropriate updates.\n\n#### Follow best-practices\n\nWe recommend that you follow best practices when connecting IoT or embedded devices to a network:\n\n * Avoid exposure of IoT and embedded devices directly over the Internet and use a segmented network zone when available.\n * Enable security features such as deep-packet inspection and firewall anomaly detection when available to protect embedded and IoT devices.\n * Ensure secure defaults are adopted and disable unused features and services on your embedded devices.\n * Regularly update firmware to the vendor provided latest stable version to ensure your device is up to date.\n\n### Acknowledgements\n\nJos Wetzels, Stanislav Dashevskyi, Amine Amri and Daniel dos Santos of [Forescout Technologies](<https://www.forescout.com/>) researched and reported these vulnerabilities. \n\nThis document was written by Vijay Sarvepalli.\n\n### Vendor Information\n\n815128\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n### Cyanconnode AB __ Affected\n\nNotified: 2020-12-09 Updated: 2020-12-09\n\n**Statement Date: December 08, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Affected \n**CVE-2020-13986**| Affected \n**CVE-2020-13987**| Affected \n**CVE-2020-13988**| Affected \n**CVE-2020-17437**| Affected \n**CVE-2020-17438**| Affected \n**CVE-2020-17439**| Affected \n**CVE-2020-17440**| Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nCyanconnode is aware of multiple security vulnerabilities in the uIP stack - commonly referred to as \"AMNESIA:33\". The Cyan Technlogy IDE, CyanIDE, was distributed with uIP v1.0. The final release of CyanIDE before it reached end-of-life was v2.4.0 in 2014. Therefore, we deem the exploitation of our product a low risk. Patches won't be provided since the affected product is end-of-life.\n\n### FNet __ Affected\n\nNotified: 2020-08-24 Updated: 2021-02-16\n\n**Statement Date: February 16, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Affected \n**CVE-2020-17468**| Affected \n**CVE-2020-17469**| Affected \n**CVE-2020-17470**| Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nAll mentioned vulnerabilities were solved in previous FNET v4.7.0 release.\n\n#### References\n\n * <https://github.com/butok/FNET>\n * <https://github.com/butok/FNET/releases/tag/v4.7.1>\n\n#### CERT Addendum\n\nFNET has their latest repository at Github https://github.com/butok/FNET/ Their latest release is 4.7.1 linked in the References.\n\n### Microchip Technology __ Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: December 02, 2020**\n\n**CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Affected \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Affected \n**CVE-2020-17440**| Affected \n**CVE-2020-17441**| Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Affected \n**CVE-2020-24334**| Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nMicrochip is aware of a TCP/IP security vulnerability known as Amnesia:33. Microchip takes security issues seriously and is currently working to mitigate the issues and provide solutions for our clients. We have determined that some CVEs affect some of our networking products. For details on impacted products and resolution plans, visit below URL.\n\n#### References\n\n * <https://www.microchip.com/design-centers/wireless-connectivity/software-vulnerability-response/amnesia-network-stack-vulnerability>\n\n### Netgear Affected\n\nNotified: 2020-08-21 Updated: 2021-03-23\n\n**Statement Date: March 19, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### SUSE Linux __ Affected\n\nNotified: 2020-09-15 Updated: 2020-12-14\n\n**Statement Date: December 14, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Affected \n**Vendor Statement:** \nour open-iscsi package is affected by this uIP issue \n**CVE-2020-13988**| Affected \n**Vendor Statement:** \nOur open-iscsi package be affected by this issue. \n**CVE-2020-17437**| Affected \n**Vendor Statement:** \nour open-iscsi package is affected by this issue. \n**CVE-2020-17438**| Affected \n**Vendor Statement:** \nour open-iscsi package is affected by this issue. \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nThe Linux Kernel TCP/IP stack used by SUSE Linux Enterprise and openSUSE is not affected by the listed vulnerabilities.\n\nSUSE ships open-iscsi, which embeds a version of the uIP IP stack, which is affected by some of the vulnerabilities, and will provide fixes.\n\n#### References\n\n * <https://www.suse.com/c/suse-statement-on-amnesia33-vulnerabilities/>\n\n### Siemens __ Affected\n\nNotified: 2020-10-28 Updated: 2021-03-23\n\n**Statement Date: March 18, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Affected \n**CVE-2020-13988**| Affected \n**CVE-2020-17437**| Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nSiemens is aware of the security vulnerabilities in several TCP/IP stacks, also named \u201cAMNESIA:33\u201d and disclosed on 2020-12-08. The impact to Siemens products is described in the Security Advisories SSA-541017, published on 2020-12-08 and SSA-541018, published on 2021-03-09 on the Siemens ProductCERT page (https://www.siemens.com/cert/advisories).\n\n#### References\n\n * <https://cert-portal.siemens.com/productcert/pdf/ssa-541017.pdf>\n * <https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf>\n\n### Weinert Automation __ Affected\n\nNotified: 2020-12-09 Updated: 2020-12-09\n\n**Statement Date: December 08, 2020**\n\n**CVE-2020-13984**| Affected \n---|--- \n**CVE-2020-13985**| Affected \n**CVE-2020-13986**| Affected \n**CVE-2020-13987**| Affected \n**CVE-2020-13988**| Affected \n**CVE-2020-17437**| Affected \n**CVE-2020-17438**| Affected \n**CVE-2020-17439**| Affected \n**CVE-2020-17440**| Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWeinert-automation is aware of multiple security vulnerabilities in the uIP stack - commonly referred to as \"AMNESIA:33\". The stack was used in weAut_01 (software weAutSys) which was discontinued in 2012 and is verifiably not in use anymore. Therefore, we deem the exploitation of our product a low risk. Patches won't be provided since the product is end-of-life.\n\n### iscsi __ Affected\n\nNotified: 2020-09-15 Updated: 2020-12-21 **CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n#### CERT Addendum\n\nhttps://github.com/open-iscsi/open-iscsi/security/advisories/GHSA-r278-fm99-8rgp\n\n### ARM mbed TLS Not Affected\n\nNotified: 2020-08-24 Updated: 2020-12-08\n\n**Statement Date: September 24, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### AVM GmbH Not Affected\n\nNotified: 2021-02-04 Updated: 2021-03-23\n\n**Statement Date: March 22, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Abbott Labs __ Not Affected\n\nNotified: 2020-12-02 Updated: 2020-12-08 **CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n#### CERT Addendum\n\nStatement provided by Abbott labs available at ICS-CERT advisory\n\n### Afero Not Affected\n\nNotified: 2020-08-24 Updated: 2020-12-08\n\n**Statement Date: December 07, 2020**\n\n**CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Arista Networks Inc. __ Not Affected\n\nNotified: 2020-08-24 Updated: 2020-12-08\n\n**Statement Date: December 07, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nArista Networks does not use the affected software in any of its product lines.\n\n### B. Braun __ Not Affected\n\nNotified: 2020-12-09 Updated: 2021-01-06\n\n**Statement Date: January 06, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n#### References\n\n * <https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory.html>\n\n### Barracuda Networks __ Not Affected\n\nNotified: 2020-08-25 Updated: 2020-12-08\n\n**Statement Date: September 16, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nBarracuda does not use these libraries in any of our products.\n\n### Belden __ Not Affected\n\nNotified: 2020-08-20 Updated: 2021-03-23\n\n**Statement Date: March 22, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nBelden devices do not contain the vulnerable software and are not affected by this vulnerability.\n\n### Blackberry QNX Not Affected\n\nNotified: 2020-08-26 Updated: 2020-12-08\n\n**Statement Date: September 21, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Brocade Communication Systems __ Not Affected\n\nNotified: 2020-08-26 Updated: 2021-03-23\n\n**Statement Date: March 18, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-13985**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-13986**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-13987**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-13988**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17437**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17438**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17439**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17440**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17441**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17442**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17443**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17444**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17445**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17467**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17468**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17469**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-17470**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24334**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24335**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24336**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24337**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24338**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24339**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24340**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24341**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-24383**| Not Affected \n**Vendor Statement:** \nNo Brocade Fibre Channel Products from Broadcom are currently known to be affected by this vulnerability. \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n### Ceragon Networks Inc __ Not Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: December 08, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nNot affected by this case\n\n### Check Point __ Not Affected\n\nNotified: 2020-12-23 Updated: 2021-03-23\n\n**Statement Date: March 21, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nCheck Point is not affected by these vulnerabilities.\n\n### Cisco Not Affected\n\nNotified: 2020-08-20 Updated: 2021-03-23\n\n**Statement Date: March 22, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Dell SecureWorks Not Affected\n\nNotified: 2020-08-31 Updated: 2020-12-14\n\n**Statement Date: December 11, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Digi International __ Not Affected\n\nNotified: 2020-08-20 Updated: 2020-12-14\n\n**Statement Date: December 09, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe do not use any of the affected stacks in our products. https://www.digi.com/resources/security\n\n### Espressif Systems __ Not Affected\n\nNotified: 2020-09-09 Updated: 2021-01-13\n\n**Statement Date: January 12, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nEspressif ESP8266 SDKs and ESP-IDF (SDK for ESP32 and ESP32-S2) both use the TCP/IP library lwIP, therefore are not affected by these vulnerabilities.\n\n### F5 Networks Inc. __ Not Affected\n\nNotified: 2020-08-21 Updated: 2020-12-08\n\n**Statement Date: December 08, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-13985**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-13986**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-13987**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-13988**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17437**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17438**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17439**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17440**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17441**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17442**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17443**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17444**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17445**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17467**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17468**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17469**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-17470**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24334**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24335**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24336**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24337**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24338**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24339**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24340**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24341**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-24383**| Not Affected \n**Vendor Statement:** \nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products. \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nF5 firmware (BIOS, LOP, BMC, LCD) does not use these products.\n\n### Fastly Not Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: December 07, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Fitbit __ Not Affected\n\nNotified: 2020-12-02 Updated: 2020-12-08\n\n**Statement Date: December 07, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nBased on our review, we can confirm that Fitbit is not affected by the \"Amnesia\" IoT TCP/IP stack vulnerabilities identified by the team at Forescout Technologies.\n\n#### CERT Addendum\n\nFitbit statement was provided to ICS-CERT\n\n### Fujitsu Not Affected\n\nNotified: 2020-09-09 Updated: 2020-12-16\n\n**Statement Date: December 16, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Google Not Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: September 25, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### HCC Not Affected\n\nNotified: 2020-09-09 Updated: 2020-12-08\n\n**Statement Date: December 08, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Infoblox __ Not Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: September 16, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nOur products have none of the embedded software listed in this case.\n\n### Intel Not Affected\n\nNotified: 2020-08-20 Updated: 2021-01-11\n\n**Statement Date: January 11, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Juniper Networks __ Not Affected\n\nNotified: 2020-08-20 Updated: 2020-12-08\n\n**Statement Date: September 02, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**Vendor Statement:** \nJuniper Networks products do not use Contiki-OS, thus we are not affected. \n**CVE-2020-13985**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Contiki-OS, thus we are not affected. \n**CVE-2020-13986**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Contiki-OS, thus we are not affected. \n**CVE-2020-13987**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use uIP, thus we are not affected. \n**CVE-2020-13988**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Contiki-OS, thus we are not affected. \n**CVE-2020-17437**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Contiki-OS, thus we are not affected. \n**CVE-2020-17438**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use uIP, thus we are not affected. \n**CVE-2020-17439**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use uIP, thus we are not affected. \n**CVE-2020-17440**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use uIP, thus we are not affected. \n**CVE-2020-17441**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP nor PicoTCP-NG, thus we are not affected. \n**CVE-2020-17442**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP nor PicoTCP-NG, thus we are not affected. \n**CVE-2020-17443**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP nor PicoTCP-NG, thus we are not affected. \n**CVE-2020-17444**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP and PicoTCP-NG, thus we are not affected. \n**CVE-2020-17445**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP nor PicoTCP-NG, thus we are not affected. \n**CVE-2020-17467**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Fnet, thus we are not affected. \n**CVE-2020-17468**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Fnet, thus we are not affected. \n**CVE-2020-17469**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Fnet, thus we are not affected. \n**CVE-2020-17470**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Fnet, thus we are not affected. \n**CVE-2020-24334**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Contiki-OS, thus we are not affected. \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Contiki-OS, thus we are not affected. \n**CVE-2020-24337**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP nor PicoTCP-NG, thus we are not affected. \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP nor PicoTCP-NG, thus we are not affected. \n**CVE-2020-24341**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use PicoTCP nor PicoTCP-NG, thus we are not affected. \n**CVE-2020-24383**| Not Affected \n**Vendor Statement:** \nJuniper Networks products do not use Fnet, thus we are not affected. \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n### Miredo __ Not Affected\n\nNotified: 2020-08-28 Updated: 2021-01-28\n\n**Statement Date: January 19, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nmiredo uses adhoc code for ICMPv6; is not involved with DNS.\n\n### Nokia Not Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: September 03, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Rockwell Automation Not Affected\n\nNotified: 2020-08-25 Updated: 2021-05-11\n\n**Statement Date: April 13, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Securepoint GmbH Not Affected\n\nNotified: 2020-12-15 Updated: 2021-03-23\n\n**Statement Date: March 19, 2021**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Not Affected \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Sophos __ Not Affected\n\nNotified: 2020-09-07 Updated: 2020-12-21\n\n**Statement Date: December 21, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nSophos products and services are not impacted by these vulnerabilities.\n\n### VMware __ Not Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: September 14, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nVmware is not affected by these issues directly.\n\n### VMware Carbon Black Not Affected\n\nNotified: 2020-08-28 Updated: 2020-12-08\n\n**Statement Date: September 09, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Wind River Not Affected\n\nNotified: 2020-08-25 Updated: 2020-12-08\n\n**Statement Date: October 14, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Xilinx __ Not Affected\n\nNotified: 2020-08-25 Updated: 2020-12-08\n\n**Statement Date: September 11, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nXilinx is not affected by these vulnerabilities.\n\n#### References\n\n * <https://www.xilinx.com/support/service-portal/security.html>\n\n### Zebra Technologies Not Affected\n\nNotified: 2020-08-28 Updated: 2021-01-28 **CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Zephyr Project __ Not Affected\n\nNotified: 2020-09-07 Updated: 2020-12-08\n\n**Statement Date: October 05, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nThe affected code is not used in the Zephyr TCP implementation.\n\n### Zyxel __ Not Affected\n\nNotified: 2020-08-21 Updated: 2020-12-09\n\n**Statement Date: December 09, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nZyxel is NOT affected because our products don\u2019t make use of these TCP/IP software\n\n### dd-wrt Not Affected\n\nNotified: 2020-12-02 Updated: 2020-12-08\n\n**Statement Date: December 08, 2020**\n\n**CVE-2020-13984**| Not Affected \n---|--- \n**CVE-2020-13985**| Not Affected \n**CVE-2020-13986**| Not Affected \n**CVE-2020-13987**| Not Affected \n**CVE-2020-13988**| Not Affected \n**CVE-2020-17437**| Not Affected \n**CVE-2020-17438**| Not Affected \n**CVE-2020-17439**| Not Affected \n**CVE-2020-17440**| Not Affected \n**CVE-2020-17441**| Not Affected \n**CVE-2020-17442**| Not Affected \n**CVE-2020-17443**| Not Affected \n**CVE-2020-17444**| Not Affected \n**CVE-2020-17445**| Not Affected \n**CVE-2020-17467**| Not Affected \n**CVE-2020-17468**| Not Affected \n**CVE-2020-17469**| Not Affected \n**CVE-2020-17470**| Not Affected \n**CVE-2020-24334**| Not Affected \n**CVE-2020-24335**| Not Affected \n**CVE-2020-24336**| Not Affected \n**CVE-2020-24337**| Not Affected \n**CVE-2020-24338**| Not Affected \n**CVE-2020-24339**| Not Affected \n**CVE-2020-24340**| Not Affected \n**CVE-2020-24341**| Not Affected \n**CVE-2020-24383**| Not Affected \n**CVE-2020-25107**| Not Affected \n**CVE-2020-25108**| Not Affected \n**CVE-2020-25109**| Not Affected \n**CVE-2020-25110**| Not Affected \n**CVE-2020-25111**| Not Affected \n**CVE-2020-25112**| Not Affected \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Alcatel-Lucent Enterprise Unknown\n\nNotified: 2020-08-24 Updated: 2021-05-11\n\n**Statement Date: April 06, 2021**\n\n**CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Texas Instruments __ Unknown\n\nNotified: 2020-12-02 Updated: 2021-03-15\n\n**Statement Date: January 21, 2021**\n\n**CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n#### CERT Addendum\n\nPlease visit Texas Instrument PSIRT anouncement on AMNESIA:33 vulnerabilities. https://www.ti.com/lit/ml/sszo001/sszo001.pdf?ts=1615806156409\n\n### m0n0wall __ Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-17 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n#### CERT Addendum\n\nNote that M0n0wall is end-of-life http://forum.m0n0.ch/forum/topic,6369.0.html https://m0n0.ch/wall/mailinglist.php\n\nAdministrator of this software, Manuel Kasper, recommends you move to OPNSense\n\n### ADATA Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### ANTlabs Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Actelis Networks Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Aerohive Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### AhnLab Inc Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Akamai Technologies Inc. Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Allied Telesis Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Altran Intelligent Systems Unknown\n\nNotified: 2020-08-20 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Apache Software Foundation Unknown\n\nNotified: 2020-11-02 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Aruba Networks Unknown\n\nNotified: 2020-10-02 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Atheros Communications Inc Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Avaya Inc. Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Belkin Inc. Unknown\n\nNotified: 2020-08-26 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Bell Canada Enterprises Unknown\n\nNotified: 2020-08-26 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Blunk Microsystems Unknown\n\nNotified: 2020-08-26 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### BoringSSL Unknown\n\nNotified: 2020-08-26 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Broadcom Unknown\n\nNotified: 2020-08-26 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### CERT-UBIK Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### CMX Systems Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Cambium Networks Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Canon Unknown\n\nNotified: 2020-12-02 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### CareStream Unknown\n\nNotified: 2020-08-20 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Cesanta Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Cirpack Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Commscope Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Contiki OS Unknown\n\nNotified: 2020-08-24 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Cricket Wireless Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Cypress Semiconductor Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### D-Link Systems Inc. Unknown\n\nNotified: 2020-08-20 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Dell Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Dell EMC Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Deutsche Telekom Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Devicescape Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Diebold Election Systems Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### ENEA Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### EfficientIP Unknown\n\nNotified: 2020-08-31 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Egnite Unknown\n\nNotified: 2020-09-16 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Ericsson Unknown\n\nNotified: 2020-08-21 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Extreme Networks Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Force10 Networks Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Foundry Brocade Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### FreeBSD Project Unknown\n\nNotified: 2020-08-25 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### FreeRTOS Unknown\n\nNotified: 2020-08-25 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### GFI Software Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Grandstream Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Green Hills Software Unknown\n\nNotified: 2020-08-25 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### HP Inc. Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Hewlett Packard Enterprise Unknown\n\nNotified: 2020-08-25 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Hitachi Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Honeywell Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Huawei Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### IBM Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### IBM Corporation (zseries) Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### IBM Numa-Q Division (Formerly Sequent) Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### ICASI Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### INTEROP Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### IP Infusion Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### InfoExpress Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Inmarsat Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Kwikset Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### LG Electronics Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### LITE-ON Technology Corporation Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Lantronix Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Lenovo Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### LibreSSL Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### LiteSpeed Technologies Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Lynx Software Technologies Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Marvell Semiconductor Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### MediaTek Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Medtronic Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Metaswitch Networks Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Micrium Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Microsoft Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Monroe Electronics Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Motorola Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Muonics Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### NEC Corporation Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### NETSCOUT Unknown\n\nNotified: 2020-08-28 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### NetBSD Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### NetBurner Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### OleumTech Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### OpenConnect Ltd Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### OpenSSL Unknown\n\nNotified: 2020-09-09 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Oracle Corporation Unknown\n\nNotified: 2020-08-20 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Oryx Embedded Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Paessler Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Palo Alto Networks Unknown\n\nNotified: 2020-08-20 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Panasonic Unknown\n\nNotified: 2020-08-21 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Philips Electronics Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Proxim Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Pulse Secure Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### QLogic Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### QNAP Unknown\n\nNotified: 2020-10-08 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Quadros Systems Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Qualcomm Unknown\n\nNotified: 2020-08-25 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Riverbed Technologies Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Roku Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Ruijie Networks Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### SEIKO EPSON Corp. / Epson America Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### SafeNet Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Samsung Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Samsung Semiconductor Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Schneider Electric Unknown\n\nNotified: 2020-12-08 Updated: 2020-12-09 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Siemens Nixdorf AG Unknown\n\nNotified: 2020-10-26 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Sierra Wireless Unknown\n\nNotified: 2020-12-10 Updated: 2020-12-14 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### SmoothWall Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### SonicWall Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Sonos Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Systech Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### TCPWave Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### TP-LINK Unknown\n\nNotified: 2020-12-10 Updated: 2020-12-14 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Tenable Network Security Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### TippingPoint Technologies Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Tizen Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Toshiba Commerce Solutions Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Ubuntu Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Untangle Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vertical Networks Inc. Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### WizNET Technology Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Xerox Unknown\n\nNotified: 2020-12-02 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Yamaha Corporation Unknown\n\nNotified: 2020-12-02 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### ZTE Corporation Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### netsnmp Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### netsnmpj Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### wolfSSL Unknown\n\nNotified: 2020-09-07 Updated: 2020-12-08 **CVE-2020-13984**| Unknown \n---|--- \n**CVE-2020-13985**| Unknown \n**CVE-2020-13986**| Unknown \n**CVE-2020-13987**| Unknown \n**CVE-2020-13988**| Unknown \n**CVE-2020-17437**| Unknown \n**CVE-2020-17438**| Unknown \n**CVE-2020-17439**| Unknown \n**CVE-2020-17440**| Unknown \n**CVE-2020-17441**| Unknown \n**CVE-2020-17442**| Unknown \n**CVE-2020-17443**| Unknown \n**CVE-2020-17444**| Unknown \n**CVE-2020-17445**| Unknown \n**CVE-2020-17467**| Unknown \n**CVE-2020-17468**| Unknown \n**CVE-2020-17469**| Unknown \n**CVE-2020-17470**| Unknown \n**CVE-2020-24334**| Unknown \n**CVE-2020-24335**| Unknown \n**CVE-2020-24336**| Unknown \n**CVE-2020-24337**| Unknown \n**CVE-2020-24338**| Unknown \n**CVE-2020-24339**| Unknown \n**CVE-2020-24340**| Unknown \n**CVE-2020-24341**| Unknown \n**CVE-2020-24383**| Unknown \n**CVE-2020-25107**| Unknown \n**CVE-2020-25108**| Unknown \n**CVE-2020-25109**| Unknown \n**CVE-2020-25110**| Unknown \n**CVE-2020-25111**| Unknown \n**CVE-2020-25112**| Unknown \n**CVE-2021-28362**| Unknown \n \n#### Vendor Statement\n\nWe have not received a statement from the vendor.\n\nView all 174 vendors __View less vendors __\n\n \n\n\n### References\n\n * <https://www.forescout.com/amnesia33>\n * <https://us-cert.cisa.gov/ics/advisories/ICSA-20-343-01>\n * <https://www.iotsecurityfoundation.org/securing-the-embedded-iot-world/>\n * <https://krebsonsecurity.com/2018/01/some-basic-rules-for-securing-your-iot-stuff/>\n * <https://skelia.com/articles/iot-security-why-your-toaster-needs-a-firewall/>\n\n### Other Information\n\n**CVE IDs:** | [CVE-2020-13984 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-13984>) [CVE-2020-13985 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-13985>) [CVE-2020-13986 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-13986>) [CVE-2020-13987 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-13987>) [CVE-2020-13988 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-13988>) [CVE-2020-17437 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17437>) [CVE-2020-17438 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17438>) [CVE-2020-17439 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17439>) [CVE-2020-17440 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17440>) [CVE-2020-17441 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17441>) [CVE-2020-17442 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17442>) [CVE-2020-17443 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17443>) [CVE-2020-17444 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17444>) [CVE-2020-17445 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17445>) [CVE-2020-17467 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17467>) [CVE-2020-17468 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17468>) [CVE-2020-17469 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17469>) [CVE-2020-17470 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-17470>) [CVE-2020-24334 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24334>) [CVE-2020-24335 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24335>) [CVE-2020-24336 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24336>) [CVE-2020-24337 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24337>) [CVE-2020-24338 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24338>) [CVE-2020-24339 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24339>) [CVE-2020-24340 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24340>) [CVE-2020-24341 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24341>) [CVE-2020-24383 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-24383>) [CVE-2020-25107 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-25107>) [CVE-2020-25108 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-25108>) [CVE-2020-25109 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-25109>) [CVE-2020-25110 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-25110>) [CVE-2020-25111 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-25111>) [CVE-2020-25112 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2020-25112>) [CVE-2021-28362 ](<http://web.nvd.nist.gov/vuln/detail/CVE-2021-28362>) \n---|--- \n**Date Public:** | 2020-12-08 \n**Date First Published:** | 2020-12-08 \n**Date Last Updated: ** | 2021-05-11 15:55 UTC \n**Document Revision: ** | 17 \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-12-08T00:00:00", "type": "cert", "title": "Embedded TCP/IP stacks have memory corruption vulnerabilities", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-13984", "CVE-2020-13985", "CVE-2020-13986", "CVE-2020-13987", "CVE-2020-13988", "CVE-2020-17437", "CVE-2020-17438", "CVE-2020-17439", "CVE-2020-17440", "CVE-2020-17441", "CVE-2020-17442", "CVE-2020-17443", "CVE-2020-17444", "CVE-2020-17445", "CVE-2020-17467", "CVE-2020-17468", "CVE-2020-17469", "CVE-2020-17470", "CVE-2020-24334", "CVE-2020-24335", "CVE-2020-24336", "CVE-2020-24337", "CVE-2020-24338", "CVE-2020-24339", "CVE-2020-24340", "CVE-2020-24341", "CVE-2020-24383", "CVE-2020-25107", "CVE-2020-25108", "CVE-2020-25109", "CVE-2020-25110", "CVE-2020-25111", "CVE-2020-25112", "CVE-2021-28362"], "modified": "2021-05-11T15:55:00", "id": "VU:815128", "href": "https://www.kb.cert.org/vuls/id/815128", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}