7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.005 Low
EPSS
Percentile
76.0%
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The
earliest affected version is 3.6.3 (2018-07-16) because of an error in a
2017-10-06 commit. The DTLS client always uses 32 ‘\0’ bytes instead of a
random value, and thus contributes no randomness to a DTLS negotiation.
This breaks the security guarantees of the DTLS protocol.
gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
launchpad.net/bugs/cve/CVE-2020-11501
nvd.nist.gov/vuln/detail/CVE-2020-11501
security-tracker.debian.org/tracker/CVE-2020-11501
ubuntu.com/security/notices/USN-4322-1
www.cve.org/CVERecord?id=CVE-2020-11501
www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.005 Low
EPSS
Percentile
76.0%