{"api_version":"1","generated_at":"2026-04-23T05:14:51+00:00","cve":"CVE-2020-13401","urls":{"html":"https://cve.report/CVE-2020-13401","api":"https://cve.report/api/cve/CVE-2020-13401.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-13401","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-13401"},"summary":{"title":"CVE-2020-13401","description":"An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-06-02 14:15:00","updated_at":"2023-11-07 03:16:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://www.debian.org/security/2020/dsa-4716","name":"DSA-4716","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4716-1 docker.io","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/docker/docker-ce/releases/tag/v19.03.11","name":"https://github.com/docker/docker-ce/releases/tag/v19.03.11","refsource":"CONFIRM","tags":["Release Notes","Third Party Advisory"],"title":"Release 19.03.11 · docker/docker-ce · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/","name":"FEDORA-2020-6d7deafd81","refsource":"","tags":[],"title":"[SECURITY] Fedora 32 Update: moby-engine-19.03.11-1.ce.git42e35e6.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/","name":"FEDORA-2020-5ba8c2d9d5","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 31 Update: moby-engine-19.03.11-1.ce.git42e35e6.fc31 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html","name":"openSUSE-SU-2020:0846","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:0846-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2020/06/01/5","name":"http://www.openwall.com/lists/oss-security/2020/06/01/5","refsource":"MISC","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - Kubernetes: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router\n advertisements","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202008-15","name":"GLSA-202008-15","refsource":"GENTOO","tags":[],"title":"Docker: Information disclosure (GLSA 202008-15) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://docs.docker.com/engine/release-notes/","name":"https://docs.docker.com/engine/release-notes/","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"Docker Engine release notes | Docker Documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/","name":"FEDORA-2020-6d7deafd81","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 32 Update: moby-engine-19.03.11-1.ce.git42e35e6.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20200717-0002/","name":"https://security.netapp.com/advisory/ntap-20200717-0002/","refsource":"CONFIRM","tags":[],"title":"CVE-2020-13401 Docker Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/","name":"FEDORA-2020-5ba8c2d9d5","refsource":"","tags":[],"title":"[SECURITY] Fedora 31 Update: moby-engine-19.03.11-1.ce.git42e35e6.fc31 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-13401","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13401","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"13401","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"sannav","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"13401","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"13401","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"docker","cpe5":"engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"13401","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"docker","cpe5":"engine","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"13401","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"31","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"13401","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-13401","qid":"353056","title":"Amazon Linux Security Advisory for docker : ALAS2NITRO-ENCLAVES-2021-002"},{"cve":"CVE-2020-13401","qid":"353069","title":"Amazon Linux Security Advisory for docker : ALAS2DOCKER-2021-002"},{"cve":"CVE-2020-13401","qid":"500867","title":"Alpine Linux Security Update for docker"},{"cve":"CVE-2020-13401","qid":"504671","title":"Alpine Linux Security Update for docker"},{"cve":"CVE-2020-13401","qid":"6140128","title":"AWS Bottlerocket Security Update for Docker (GHSA-67fp-jghp-c759)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-13401","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://docs.docker.com/engine/release-notes/","refsource":"MISC","name":"https://docs.docker.com/engine/release-notes/"},{"refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2020/06/01/5","url":"http://www.openwall.com/lists/oss-security/2020/06/01/5"},{"refsource":"CONFIRM","name":"https://github.com/docker/docker-ce/releases/tag/v19.03.11","url":"https://github.com/docker/docker-ce/releases/tag/v19.03.11"},{"refsource":"FEDORA","name":"FEDORA-2020-5ba8c2d9d5","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/"},{"refsource":"FEDORA","name":"FEDORA-2020-6d7deafd81","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/"},{"refsource":"SUSE","name":"openSUSE-SU-2020:0846","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html"},{"refsource":"DEBIAN","name":"DSA-4716","url":"https://www.debian.org/security/2020/dsa-4716"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20200717-0002/","url":"https://security.netapp.com/advisory/ntap-20200717-0002/"},{"refsource":"GENTOO","name":"GLSA-202008-15","url":"https://security.gentoo.org/glsa/202008-15"}]}},"nvd":{"publishedDate":"2020-06-02 14:15:00","lastModifiedDate":"2023-11-07 03:16:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW","baseScore":6,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6},"severity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:docker:engine:*:*:*:*:*:*:*:*","versionEndExcluding":"19.03.11","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:broadcom:sannav:-:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"13401","Ordinal":"174584","Title":"CVE-2020-13401","CVE":"CVE-2020-13401","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"13401","Ordinal":"1","NoteData":"An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"13401","Ordinal":"2","NoteData":"2020-06-02","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"13401","Ordinal":"3","NoteData":"2020-08-26","Type":"Other","Title":"Modified"}]}}}