{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/782301#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview ###\r\n<p>pppd (Point to Point Protocol Daemon) versions 2.4.2 through 2.4.8 are vulnerable to buffer overflow due to a flaw in Extensible Authentication Protocol (EAP) packet processing in eap_request and eap_response subroutines.</p>\r\n\r\n### Description ###\r\nPPP is the protocol used for establishing internet links over dial-up modems, DSL connections, and many other types of point-to-point links including Virtual Private Networks (VPN) such as Point to Point Tunneling Protocol (PPTP).  The pppd software can also authenticate a network connected peer and/or supply authentication information to the peer using multiple authentication protocols including EAP.  </p><p>Due to a flaw in the Extensible Authentication Protocol (EAP) packet processing in the Point-to-Point Protocol Daemon (pppd), an unauthenticated remote attacker may be able to cause a stack buffer overflow, which may allow arbitrary code execution on the target system.  This vulnerability is due to an error in validating the size of the input before copying the supplied data into memory.  As the validation of the data size is incorrect, arbitrary data can be copied into memory and cause memory corruption possibly leading to execution of unwanted code.<br/><br/>The vulnerability is in the logic of the eap parsing code, specifically in the eap_request() and eap_response() functions in eap.c that are called by a network input handler. These functions take a pointer and length as input using the the first byte as a type. If the type is EAPT_MD5CHAP(4), it looks at an embedded 1-byte length field. The logic in this code is intended to makes sure that embedded length is smaller than the whole packet length. After this verification, it tries to copy provided data (hostname) that is located after the embedded length field into a local stack buffer. This bounds check is incorrect and allows for memory copy to happen with an arbitrary length of data. <br/><br/>An additional logic flaw causes the eap_input() function to not check if EAP has been negotiated during the Link Control Protocol (LCP) phase.  This allows an unauthenticated attacker to send an EAP packet even if ppp refused the authentication negotiation due to lack of support for EAP or due to mismatch of an agreed pre-shared passphrase in the LCP phase.  The vulnerable pppd code in eap_input will still process the EAP packet and trigger the stack buffer overflow.  This unverified data with an unknown size can be used to corrupt memory of the target system. The  pppd often runs with high privileges (system or root) and works in conjunction with kernel drivers.  This makes it possible for an attacker to potentially execute arbitrary code with system or root level privileges.<br/><br/>The pppd software is also adopted into lwIP (lightweight IP) project to provide pppd capabilities for small devices.  The default installer and packages of lwIP are not vulnerable to this buffer overflow.  However if you have used the lwIP source code and configured specifically to enable EAP at compile time, your software is likely vulnerable to the buffer overflow. The recommended update is available from Git repoistory  <a href=\"http://git.savannah.nongnu.org/cgit/lwip.git\">http://git.savannah.nongnu.org/cgit/lwip.git</a>.<br/><br/>This type of weakness is commonly associated in Common Weakness Enumeration (CWE) with <a href=\"http://cwe.mitre.org/data/definitions/120.html\">CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')</a>.  A Proof-of-Concept exploit for PPTP VPN Servers with additional tools are [available](https://github.com/CERTCC/PoC-Exploits/tree/master/cve-2020-8597-pptpd) in the  by CERT/CC PoC repository.\r\n\r\n### Impact\r\n<p>By sending an unsolicited EAP packet to a vulnerable ppp client or server, an unauthenticated remote attacker could cause memory corruption in the pppd process, which may allow for arbitrary code execution.</p>\r\n\r\n### Solution ###\r\n\r\n#### Apply updates\r\n<p>Update your software with the latest available patches provided by your software vendor.  It is incorrect to assume that pppd is not vulnerable if EAP is not enabled or EAP has not been negotiated by a remote peer using a secret or passphrase. This is due to the fact that an authenticated attacker may still be able to send unsolicited EAP packet to trigger the buffer overflow.</p><p>If your software is packaged and created from the ppp source code,  please obtain the latest software from github pppd repository.<br/><a href=\"https://github.com/paulusmack/ppp\">https://github.com/paulusmack/ppp</a> <br/>Patch referenced : <br/><a href=\"https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426\">https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426</a> <br/><br/>In case of lwIP package that is compiled from source with EAP enabled at compile time, obtain the latest software from github <br/><a href=\"http://git.savannah.nongnu.org/cgit/lwip.git\">http://git.savannah.nongnu.org/cgit/lwip.git</a> <br/>Patch referenced: <br/><a href=\"http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=2ee3cbe69c6d2805e64e7cac2a1c1706e49ffd86\">http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=2ee3cbe69c6d2805e64e7cac2a1c1706e49ffd86</a> <br/><br/>Note: the latest software also includes ignoring out-of-order or unsolicited EAP packets from being processed as an additional precautionary measure.  It is recommended that you use the latest available software from the appropriate Git repository that includes this fix.</p>\r\n\r\n#### Proof of Concept (PoC)\r\nA proof-of-concept for testing if a PPTP server is vulnerable to cve-2020-8597 is [available](https://github.com/CERTCC/PoC-Exploits/blob/master/cve-2020-8597-pptpd/pptp_poc.py) in the CERT/CC PoC respository\r\n\r\n#### Detection Signature (IDS)\r\nA Snort/Surricata IDS rule to detect cve-2020-8597 buffer overflow attempts against PPTP servers is also [available](https://github.com/CERTCC/PoC-Exploits/blob/master/cve-2020-8597-pptpd/cve-2020-8597-pptpd.rules) in the CERT/CC PoC respository.  \r\n\r\n### Workaround \r\nThere is no viable work around except to patch the software with updated software made available by the software vendors.</p>\r\n\r\n### Acknowledgements ###\r\nThanks to Ilja Van Sprundel from IOActive for reporting this vulnerability.\r\n\t\r\nThis document was written by Vijay Sarvepalli.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"lwIP is a bit different than pppd,we added a lot of preprocessor directives to enable or disable features at compile time in order to reduce binary size output and EAP is disabled by default: http://git.savannah.nongnu.org/cgit/lwip.git/tree/src/include/netif/ppp/ppp_opts.h?id=d281d3e9592a3ca2ad0c3b7840f8036facc02f7b#n234 http://git.savannah.nongnu.org/cgit/lwip.git/tree/src/netif/ppp/eap.c?id=d2 81d3e9592a3ca2ad0c3b7840f8036facc02f7b#n46 That is,no product using lwIP were ever shipped with the EAP code compiled at all.","title":"Vendor statment from lwIP"},{"category":"other","text":"\r\nEAP was never used by any lwIP user. The lwIP PPP support is mostly used with cellular modems only as a framing protocol limited to the serial link between the MCU and the modem were security is less relevant because it is not authenticated anyway. The lwIP so far has had support for PAP,CHAP,MS-CHAP(tied to MPPE keys exchange),but EAP has never been enabled from compile time.","title":"CERT/CC comment on lwIP notes"},{"category":"other","text":"Security Advisory 2020-02-21-1 - ppp buffer overflow vulnerability(CVE-2020-8597)DESCRIPTION A remotely exploitable vulnerability was found in Point-to-Point Protocol Daemon(pppd),which has a significant potential impact due to the possibility of remote code execution prior to authentication. OpenWrt by default enables the_FORTIFY_SOURCE=1 compiler macro which introduces additional checks to detect buffer-overflows in the standard library functions,thus protecting the memcpy()abused in this overflow,preventing the actual buffer overflow and hence possible remote code execution by instead terminating the pppd daemon. Due to those defaults the impact of the issue was changed to a denial of service vulnerability,which is now also addressed by this fix. CVE-2020-8597 has been assigned to this issue,you can find the latest version of this advisory on our wiki. REQUIREMENTS In order to exploit this vulnerability,a malicious attacker would need to provide specially crafted EAP Request packet of type EAPT_MD5CHAP to ppp running in client mode and thus overflowing the rhostname string buffer by providing a very long hostname. MITIGATIONS To fix this issue,update the affected ppp package using the command below. `opkg update; opkg upgrade ppp`The fix is contained in the following and later versions: OpenWrt master:2020-02-20 reboot-12255-g215598fd0389 OpenWrt 19.07:2020-02-20 v19.07.1-17-g6b7eeb74dbf8 OpenWrt 18.06:2020-02-20 v18.06.7-6-gcc78f934a946 AFFECTED VERSIONS To our knowledge,OpenWrt versions 18.06.0 to 18.06.7 and versions 19.07.0 to 19.07.1 are affected. The fixed packages will be integrated in the upcoming OpenWrt 18.06.8 and OpenWrt 19.07.2 releases. Older versions of OpenWrt(e.g. OpenWrt 15.05 and LEDE 17.01)are end of life and not supported any more.","title":"Vendor statment from OpenWRT"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on OpenWRT notes"},{"category":"other","text":"Thank you for your request for Technical Support. EAP isn't supported on 3900/2960/300B PPTP,so these should not be affected. The rest of the models are running in non-linux platform,the PPTP service isn't using pppd either.","title":"Vendor statment from DrayTek Corporation"},{"category":"other","text":"Updated information from Draytek March 6,2020 Draytek DSL models are running in our in-house OS,they won't be affected by this vulnerability. Draytek also plans to add protection in the next firmware release to enhance the security for Vigor3900/2960,although EAP is not enabled or supported. Please check advisory URL mentioned below for updates.","title":"CERT/CC comment on DrayTek Corporation notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Cisco"},{"category":"other","text":"Cisco is investigating this issue and has assigned a bug ID CSCvs95534.","title":"CERT/CC comment on Cisco notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Deutsche Telekom"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Deutsche Telekom notes"},{"category":"other","text":"Package:ppp Version:2.4.6-3.1+deb8u1 CVE ID:CVE-2020-8597 Debian Bug:950618 Ilja Van Sprundel discovered a buffer overflow vulnerability in ppp,the Point-to-Point Protocol daemon. When receiving an EAP Request message in client mode,an attacker was able to overflow the rhostname array by providing a very long name. This issue is also mitigated by Debian's hardening build flags. For Debian 8\"Jessie\",this problem has been fixed in version 2.4.6-3.1+deb8u1. We recommend that you upgrade your ppp packages. Further information about Debian LTS security advisories,how to apply these updates to your system and frequently asked questions can be","title":"Vendor statment from Debian GNU/Linux"},{"category":"other","text":"Vendor bug report can be found in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950618","title":"CERT/CC comment on Debian GNU/Linux notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from NetBSD"},{"category":"other","text":"NetBSD external ppp has been updated in the CVS repository. Users can set up pkg_admin to download the pkg-vulnerabilities file daily(URL in the Vendor URL section),and include a package audit in the daily security script. Details on this are located in the MESSAGE file for pkg_install.","title":"CERT/CC comment on NetBSD notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Alcatel-Lucent Enterprise"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Alcatel-Lucent Enterprise notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Wind River"},{"category":"other","text":"Wind River support and defects page provides way to search for products affected by this vulnerability. As of Feb 4 2020,the security updates pages shows this CVE is being addressed by Windriver. Please use this defects page to search for your product or search for the CVE-2020-8597 as\"Keyword\"to obtain the relevant software and firmware updates.","title":"CERT/CC comment on Wind River notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Slackware Linux Inc."},{"category":"other","text":"Vendor has released a security advisory Wed,4 Mar 2020 14:34:55 PST. Check to make sure you are subscribed to slackware-security@slackware.com and security@slackware.com is in your whitelist to receive slackware's security advisories.","title":"CERT/CC comment on Slackware Linux Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Ubiquiti Networks"},{"category":"other","text":"Ubiquiti Networks has put out advisory using their community releases with an updated firmware to address this vulnerability. Please check the URL's below for obtaining the right firmware to patch your systems.","title":"CERT/CC comment on Ubiquiti Networks notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Buffalo Technology"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Buffalo Technology notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from s2n"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on s2n notes"},{"category":"other","text":"Visit ALAS post https://alas.aws.amazon.com/AL2/ALAS-2020-1400.html for details of this vulnerability","title":"Vendor statment from Amazon"},{"category":"other","text":"Amazon Linux has adopted RedHat advisory and published their own updates. Please see Vendor URL section for details.","title":"CERT/CC comment on Amazon notes"},{"category":"other","text":"The ppp packages distributed with Red Hat Enterprise Linux versions are compiled using gcc's stack-protector feature. The\"Stack Smashing Protection\"may help mitigate code execution attacks for this flaw and limit its impact to crash only. This flaw only affects pppd servers and clients when EAP negotiation is used. pppd will refuse to do EAP negotiation unless it has an appropriate secret to use. The secret has to be added to/etc/ppp/chap-secrets. EAP can use CHAP or SRP as the underlying flavour of authentication,Red Hat packages are not compiled with SRP code.","title":"Vendor statment from Red Hat Inc."},{"category":"other","text":"Redhat has created a Bug ID 1800727 for this vulnerability. RedHat has put our updates for their supported platforms. The vendor URL section has links to these updates. It is assumed that EAP needs to be enabled for this vulnerability to be exposed. However this is not the case as shown by Ilja Van Spronkel that even if EAP is disabled,an unauthenticated and unsolicited EAP packet can be send to trigger this vulnerability.","title":"CERT/CC comment on Red Hat Inc. notes"},{"category":"other","text":"Synology confirms the following products are affected: - DiskStation Manager(DSM)- VisualStation VS960HD - Synology Router Manager(SRM)Synology has published a security advisory on 2020-03-06 10:40:29 UTC+8 at https://www.synology.com/security/advisory/Synology_SA_20_02","title":"Vendor statment from Synology"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Synology notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from CentOS"},{"category":"other","text":"2020-02-25 - Jaroslav Skarvada<jskarvad@redhat.com>- 2.4.5-34 - Fixed buffer overflow in the eap_request and eap_response functions Resolves:CVE-2020-8597 Centos 8: Update provided follow the Vendor URL for your architecture Centos 7: Update provided follow the Vendor URL for your version and architecture Centos 6: End of Life no updates available","title":"CERT/CC comment on CentOS notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from PePLink"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on PePLink notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Arch Linux"},{"category":"other","text":"ArchLinux has updated its advisory on March 7 2020,with ASA-202003-3 advisory with resolution statement\"Upgrade to 2.4.7-7. #pacman -Syu\"ppp>=2.4.7-7\"The problem has been fixed upstream but no release is available yet.\"","title":"CERT/CC comment on Arch Linux notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Apple"},{"category":"other","text":"Apple has a forked version of ppp that was modified years earlier. It shows not affected due to the source code changes.","title":"CERT/CC comment on Apple notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Cradlepoint"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Cradlepoint notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from F-Secure Corporation"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on F-Secure Corporation notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from DragonFly BSD Project"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on DragonFly BSD Project notes"},{"category":"other","text":"FreeBSD does not distribute pppd.","title":"Vendor statment from FreeBSD Project"},{"category":"other","text":"A review of the pppd source tree suggests that FreeBSD do not include pppd in the base system(removed in r190751 - ten years ago). The first pppd version that contained the vulnerability was 2.4.2,and FreeBSD has never shipped with that version.","title":"CERT/CC comment on FreeBSD Project notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Ubuntu"},{"category":"other","text":"The ppp security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS The problem can be corrected by updating your system to the following package versions respectively: Ubuntu 19.10 ppp - 2.4.7-2+4.1ubuntu4.1 Ubuntu 18.04 LTS - ppp - 2.4.7-2+2ubuntu1.2 Ubuntu 16.04 LTS - ppp - 2.4.7-1+2ubuntu1.16.04.2 To update your system,use system package manager provided as part of Ubuntu..","title":"CERT/CC comment on Ubuntu notes"},{"category":"other","text":"We are using an older version of pppd that does not use EAP and does not have this vulnerability.","title":"Vendor statment from Actiontec"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Actiontec notes"},{"category":"other","text":"The described issue is with EAP authentication,which RouterOS doesn't support for PPP","title":"Vendor statment from MikroTik"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on MikroTik notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Fedora Project"},{"category":"other","text":"Fedora Project has put out new software updates to address this issue on Fri,21 Feb 2020 16:44:33 UTC,please use the vendor's URL's to find the suitable update for your version of Fedora and your platform.","title":"CERT/CC comment on Fedora Project notes"},{"category":"other","text":"No other Brocade Fibre Channel technology products from Broadcom are currently known to be affected by these vulnerabilities","title":"Vendor statment from Brocade Communication Systems"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Brocade Communication Systems notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from SMC Networks Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on SMC Networks Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Joyent"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Joyent notes"},{"category":"other","text":"We are indeed affected by this vulnerability in all our supported codestreams. However,this is mitigated by the FORTIFY_SOURCE overflow checking and also by the Stack Protector Overflow heuristic protection that our products ship. Updates are also on the way and we are going to release them within the next weeks. One can track the progress of the update along with all the affected software in our security page mentioned in the vendor URL section.","title":"Vendor statment from SUSE Linux"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on SUSE Linux notes"},{"category":"other","text":"FRITZ!Box and other AVM products are not affected. AVM does not use the ppp implementation from the pppd project.","title":"Vendor statment from AVM GmbH"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on AVM GmbH notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Mitel Networks Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Mitel Networks Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from OpenIndiana"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on OpenIndiana notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from A10 Networks"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on A10 Networks notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Unisys Corporation"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Unisys Corporation notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Lenovo"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Lenovo notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from HP Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on HP Inc. notes"},{"category":"other","text":"We have published a security advisory for this issue(see link below in Vendor URLs section). And we are still working on this,and all new information will be updated on this advisory.","title":"Vendor statment from TP-LINK"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on TP-LINK notes"},{"category":"other","text":"See Checkpoint security advisory sk165875 link in Vendor URL section.","title":"Vendor statment from Check Point"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Check Point notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Aspera Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Aspera Inc. notes"},{"category":"other","text":"Arista products do not have any features using pppd,hence no Arista products are affected.","title":"Vendor statment from Arista Networks Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Arista Networks Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from NetApp"},{"category":"other","text":"NetApp is investigating this issue and will continue to update this advisory as additional information becomes available. This advisory should be considered the single source of current,up-to-date,authorized and accurate information from NetApp. Advisory ID:NTAP-20200313-0004 Version:2.0 Last updated:03/16/2020 Status:Interim. CVEs:CVE-2020-8597.","title":"CERT/CC comment on NetApp notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from TrueOS"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on TrueOS notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from QNX Software Systems Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on QNX Software Systems Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from dd-wrt"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on dd-wrt notes"},{"category":"other","text":"HardenedBSD does not ship with this software in the base operating system.","title":"Vendor statment from HardenedBSD"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on HardenedBSD notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Sony"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Sony notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Oracle Corporation"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Oracle Corporation notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Huawei Technologies"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Huawei Technologies notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Quagga"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Quagga notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Dell EMC"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Dell EMC notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Hitachi"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Hitachi notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from ADTRAN"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on ADTRAN notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Gentoo Linux"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Gentoo Linux notes"},{"category":"other","text":"CoreOS Container Linux does not ship pppd.","title":"Vendor statment from CoreOS"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on CoreOS notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Belkin Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Belkin Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Comcast"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Comcast notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Openwall GNU/*/Linux"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Openwall GNU/*/Linux notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Zyxel"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Zyxel notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Extreme Networks"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Extreme Networks notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from ACCESS"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on ACCESS notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from m0n0wall"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on m0n0wall notes"},{"category":"other","text":"Juniper is not impacted by this vulnerability","title":"Vendor statment from Juniper Networks"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Juniper Networks notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Turbolinux"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Turbolinux notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Motorola Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Motorola Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Google"},{"category":"other","text":"Please see Google's advisory that was recently published to acknowledge this issue.","title":"CERT/CC comment on Google notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Tizen"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Tizen notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from DesktopBSD"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on DesktopBSD notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Geexbox"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Geexbox notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from TDS Telecom"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on TDS Telecom notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Hewlett Packard Enterprise"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Hewlett Packard Enterprise notes"},{"category":"other","text":"Fortinet FortiOS are not impacted by this vulnerability","title":"Vendor statment from Fortinet "},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Fortinet  notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Nexenta"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Nexenta notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from XigmaNAS"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on XigmaNAS notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from D-Link Systems Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on D-Link Systems Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Nokia"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Nokia notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Micro Focus"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Micro Focus notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from pfSense"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on pfSense notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Avaya Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Avaya Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from NEC Corporation"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on NEC Corporation notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from eero"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on eero notes"},{"category":"other","text":"We have published a security advisory for this issue. All new information will be updated on the advisory link below.","title":"Vendor statment from Sierra Wireless"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Sierra Wireless notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Ruckus Wireless"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Ruckus Wireless notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Illumos"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Illumos notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Technicolor"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Technicolor notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Microsoft"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Microsoft notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from F5 Networks Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on F5 Networks Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from AT&T"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on AT&T notes"},{"category":"other","text":"LANCOM Systems products are not vulnerable to these vulnerabilities.","title":"Vendor statment from LANCOM Systems GmbH"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on LANCOM Systems GmbH notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Alpine Linux"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Alpine Linux notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Quantenna Communications"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Quantenna Communications notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Netgear Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Netgear Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from ASUSTeK Computer Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on ASUSTeK Computer Inc. notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from ARRIS"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on ARRIS notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from OpenBSD"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on OpenBSD notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from SafeNet"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on SafeNet notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Intel"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Intel notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Linksys"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Linksys notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from IBM Corporation"},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on IBM Corporation notes"},{"category":"other","text":"No statement is currently available from the vendor regarding this vulnerability.","title":"Vendor statment from Marconi Inc."},{"category":"other","text":"There are no additional comments at this time.","title":"CERT/CC comment on Marconi Inc. notes"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/782301"},{"url":"https://vulners.com/cve/CVE-2020-8597","summary":"https://vulners.com/cve/CVE-2020-8597"},{"url":"https://github.com/paulusmack/ppp/commit/8d45443bb5c9372b4c6a362ba2f443d41c5636af","summary":"https://github.com/paulusmack/ppp/commit/8d45443bb5c9372b4c6a362ba2f443d41c5636af"},{"url":"https://github.com/paulusmack/ppp/commit/8d45443bb5c9372b4c6a362ba2f443d41c5636af","summary":"https://github.com/paulusmack/ppp/commit/8d45443bb5c9372b4c6a362ba2f443d41c5636af"},{"url":"http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=2ee3cbe69c6d2805e64e7cac2a1c1706e49ffd86","summary":"http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=2ee3cbe69c6d2805e64e7cac2a1c1706e49ffd86"},{"url":"http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=d281d3e9592a3ca2ad0c3b7840f8036facc02f7b","summary":"http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=d281d3e9592a3ca2ad0c3b7840f8036facc02f7b"},{"url":"https://github.com/CERTCC/PoC-Exploits/tree/master/cve-2020-8597-pptpd","summary":"https://github.com/CERTCC/PoC-Exploits/tree/master/cve-2020-8597-pptpd"},{"url":"http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=2ee3cbe69c6d2805e64","summary":"Reference(s) from vendor \"lwIP\""},{"url":"http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=d281d3e9592a3ca2ad0","summary":"Reference(s) from vendor \"lwIP\""},{"url":"https://openwrt.org/advisory/2020-02-21-1","summary":"Reference(s) from vendor \"OpenWRT\""},{"url":"https://www.draytek.com/about/security-advisory/","summary":"Reference(s) from vendor \"DrayTek Corporation\""},{"url":"https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs95534/","summary":"Reference(s) from vendor \"Cisco\""},{"url":"https://wiki.debian.org/LTS","summary":"Reference(s) from vendor \"Debian GNU/Linux\""},{"url":"https://security-tracker.debian.org/tracker/CVE-2020-8597","summary":"Reference(s) from vendor \"Debian GNU/Linux\""},{"url":"http://cvsweb.netbsd.org/bsdweb.cgi/src/external/bsd/ppp/dist/pppd/eap.c?on","summary":"Reference(s) from vendor \"NetBSD\""},{"url":"http://ftp.netbsd.org/pub/NetBSD/packages/vulns/pkg-vulnerabilities","summary":"Reference(s) from vendor \"NetBSD\""},{"url":"https://support2.windriver.com/index.php?page=defects","summary":"Reference(s) from vendor \"Wind River\""},{"url":"https://support2.windriver.com/index.php?page=defects&on=list&order_by=defe","summary":"Reference(s) from vendor \"Wind River\""},{"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2020&m=slackware-security.426655","summary":"Reference(s) from vendor \"Slackware Linux Inc.\""},{"url":"https://community.ui.com/releases","summary":"Reference(s) from vendor \"Ubiquiti Networks\""},{"url":"https://community.ui.com/releases/EdgeMAX-EdgeRouter-Security-Firmware-Upda","summary":"Reference(s) from vendor \"Ubiquiti Networks\""},{"url":"https://alas.aws.amazon.com/AL2/ALAS-2020-1400.html","summary":"Reference(s) from vendor \"Amazon\""},{"url":"https://access.redhat.com/security/cve/cve-2020-8597","summary":"Reference(s) from vendor \"Red Hat Inc.\""},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1800727","summary":"Reference(s) from vendor \"Red Hat Inc.\""},{"url":"https://access.redhat.com/errata/RHSA-2020:0630","summary":"Reference(s) from vendor \"Red Hat Inc.\""},{"url":"https://www.synology.com/security/advisory/Synology_SA_20_02","summary":"Reference(s) from vendor \"Synology\""},{"url":"https://www.synology.com/dsm","summary":"Reference(s) from vendor \"Synology\""},{"url":"https://www.synology.com/products/VS960HD","summary":"Reference(s) from vendor \"Synology\""},{"url":"https://www.synology.com/srm","summary":"Reference(s) from vendor \"Synology\""},{"url":"https://pkgs.org/search/?q=ppp","summary":"Reference(s) from vendor \"CentOS\""},{"url":"https://centos.pkgs.org/8/centos-baseos-x86_64/ppp-2.4.7-26.el8_1.x86_64.rp","summary":"Reference(s) from vendor \"CentOS\""},{"url":"https://centos.pkgs.org/7/centos-updates-x86_64/ppp-2.4.5-34.el7_7.x86_64.r","summary":"Reference(s) from vendor \"CentOS\""},{"url":"https://forum.peplink.com/t/is-peplink-affected-by-the-pppd-buffer-overflow","summary":"Reference(s) from vendor \"PePLink\""},{"url":"https://security.archlinux.org/ASA-202003-3/generate","summary":"Reference(s) from vendor \"Arch Linux\""},{"url":"https://usn.ubuntu.com/4288-1/https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8597.html","summary":"Reference(s) from vendor \"Ubuntu\""},{"url":"https://wiki.ubuntu.com/Security/Upgrades","summary":"Reference(s) from vendor \"Ubuntu\""},{"url":"https://bodhi.fedoraproject.org/updates/FEDORA-2020-571091c70b","summary":"Reference(s) from vendor \"Fedora Project\""},{"url":"https://koji.fedoraproject.org/koji/buildinfo?buildID=1468692","summary":"Reference(s) from vendor \"Fedora Project\""},{"url":"https://www.suse.com/security/cve/CVE-2020-8597/","summary":"Reference(s) from vendor \"SUSE Linux\""},{"url":"https://www.tp-link.com/en/support/faq/2803/","summary":"Reference(s) from vendor \"TP-LINK\""},{"url":"https://supportcontent.checkpoint.com/solutions?id=sk165875","summary":"Reference(s) from vendor \"Check Point\""},{"url":"https://security.netapp.com/advisory/ntap-20200313-0004/","summary":"Reference(s) from vendor \"NetApp\""},{"url":"https://source.android.com/security/bulletin/2020-06-01","summary":"Reference(s) from vendor \"Google\""},{"url":"https://www.sierrawireless.com/company/security/","summary":"Reference(s) from vendor \"Sierra Wireless\""}],"title":"pppd vulnerable to buffer overflow due to a flaw in EAP packet processing","tracking":{"current_release_date":"2020-06-15T13:40:49+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#782301","initial_release_date":"2020-02-02 00:00:00+00:00","revision_history":[{"date":"2020-06-15T13:40:49+00:00","number":"1.20200615134049.79","summary":"Released on 2020-06-15T13:40:49+00:00"}],"status":"final","version":"1.20200615134049.79"}},"vulnerabilities":[{"title":"eap.","notes":[{"category":"summary","text":"eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions."}],"cve":"CVE-2020-8597","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#782301"}],"product_status":{"known_affected":["CSAFPID-1fdac256-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fdb01bc-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fde01c8-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe03f10-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe086e6-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe229c4-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe26cd6-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe2b768-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe40c30-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe5aa2c-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe8decc-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe97864-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe9d2fa-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fec62a4-39e3-11f1-8422-122e2785dc9f","CSAFPID-1feca58e-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ff44dde-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ff49870-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ff895ba-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ff8df02-39e3-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-1fdb6a44-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe17326-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe1cf2e-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe393ae-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe3c810-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe4600e-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fe65cd8-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fead718-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fed6f28-39e3-11f1-8422-122e2785dc9f","CSAFPID-1fedca68-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ff0f9e0-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ff38336-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ff658a4-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ffa6692-39e3-11f1-8422-122e2785dc9f","CSAFPID-1ffba890-39e3-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Arch Linux","product":{"name":"Arch Linux Products","product_id":"CSAFPID-1fdac256-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Red Hat Inc.","product":{"name":"Red Hat Inc. Products","product_id":"CSAFPID-1fdb01bc-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Apple","product":{"name":"Apple Products","product_id":"CSAFPID-1fdb6a44-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cradlepoint","product":{"name":"Cradlepoint Products","product_id":"CSAFPID-1fdbc70a-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetBSD","product":{"name":"NetBSD Products","product_id":"CSAFPID-1fde01c8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F-Secure Corporation","product":{"name":"F-Secure Corporation Products","product_id":"CSAFPID-1fdf9c4a-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Alcatel-Lucent Enterprise","product":{"name":"Alcatel-Lucent Enterprise Products","product_id":"CSAFPID-1fdff942-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenWRT","product":{"name":"OpenWRT Products","product_id":"CSAFPID-1fe03f10-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Debian GNU/Linux","product":{"name":"Debian GNU/Linux Products","product_id":"CSAFPID-1fe086e6-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"DragonFly BSD Project","product":{"name":"DragonFly BSD Project Products","product_id":"CSAFPID-1fe135d2-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"lwIP","product":{"name":"lwIP Products","product_id":"CSAFPID-1fe17326-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"FreeBSD Project","product":{"name":"FreeBSD Project Products","product_id":"CSAFPID-1fe1cf2e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubuntu","product":{"name":"Ubuntu Products","product_id":"CSAFPID-1fe229c4-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Synology","product":{"name":"Synology Products","product_id":"CSAFPID-1fe26cd6-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Wind River","product":{"name":"Wind River Products","product_id":"CSAFPID-1fe2b768-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Actiontec","product":{"name":"Actiontec Products","product_id":"CSAFPID-1fe393ae-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"MikroTik","product":{"name":"MikroTik Products","product_id":"CSAFPID-1fe3c810-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fedora Project","product":{"name":"Fedora Project Products","product_id":"CSAFPID-1fe40c30-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Brocade Communication Systems","product":{"name":"Brocade Communication Systems Products","product_id":"CSAFPID-1fe4600e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SMC Networks Inc.","product":{"name":"SMC Networks Inc. Products","product_id":"CSAFPID-1fe4c3aa-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Joyent","product":{"name":"Joyent Products","product_id":"CSAFPID-1fe56ff8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SUSE Linux","product":{"name":"SUSE Linux Products","product_id":"CSAFPID-1fe5aa2c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-1fe65cd8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Mitel Networks Inc.","product":{"name":"Mitel Networks Inc. Products","product_id":"CSAFPID-1fe745f8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenIndiana","product":{"name":"OpenIndiana Products","product_id":"CSAFPID-1fe7be5c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"A10 Networks","product":{"name":"A10 Networks Products","product_id":"CSAFPID-1fe80448-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Unisys Corporation","product":{"name":"Unisys Corporation Products","product_id":"CSAFPID-1fe8430e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Lenovo","product":{"name":"Lenovo Products","product_id":"CSAFPID-1fe878a6-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Slackware Linux Inc.","product":{"name":"Slackware Linux Inc. Products","product_id":"CSAFPID-1fe8decc-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HP Inc.","product":{"name":"HP Inc. Products","product_id":"CSAFPID-1fe9120c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"TP-LINK","product":{"name":"TP-LINK Products","product_id":"CSAFPID-1fe97864-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Check Point","product":{"name":"Check Point Products","product_id":"CSAFPID-1fe9d2fa-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aspera Inc.","product":{"name":"Aspera Inc. Products","product_id":"CSAFPID-1fea1c2e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Arista Networks Inc.","product":{"name":"Arista Networks Inc. Products","product_id":"CSAFPID-1fead718-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-1feb2e84-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"TrueOS","product":{"name":"TrueOS Products","product_id":"CSAFPID-1fec1ea2-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"CentOS","product":{"name":"CentOS Products","product_id":"CSAFPID-1fec62a4-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ubiquiti Networks","product":{"name":"Ubiquiti Networks Products","product_id":"CSAFPID-1feca58e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"QNX Software Systems Inc.","product":{"name":"QNX Software Systems Inc. Products","product_id":"CSAFPID-1fece67a-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"dd-wrt","product":{"name":"dd-wrt Products","product_id":"CSAFPID-1fed2f9a-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HardenedBSD","product":{"name":"HardenedBSD Products","product_id":"CSAFPID-1fed6f28-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"DrayTek Corporation","product":{"name":"DrayTek Corporation Products","product_id":"CSAFPID-1fedca68-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sony","product":{"name":"Sony Products","product_id":"CSAFPID-1fedf786-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Buffalo Technology","product":{"name":"Buffalo Technology Products","product_id":"CSAFPID-1fee49d4-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Oracle Corporation","product":{"name":"Oracle Corporation Products","product_id":"CSAFPID-1fee9b82-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Huawei Technologies","product":{"name":"Huawei Technologies Products","product_id":"CSAFPID-1fef3f10-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Quagga","product":{"name":"Quagga Products","product_id":"CSAFPID-1fef7c1e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Dell EMC","product":{"name":"Dell EMC Products","product_id":"CSAFPID-1fefbdd2-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hitachi","product":{"name":"Hitachi Products","product_id":"CSAFPID-1ff00cd8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ADTRAN","product":{"name":"ADTRAN Products","product_id":"CSAFPID-1ff07308-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Gentoo Linux","product":{"name":"Gentoo Linux Products","product_id":"CSAFPID-1ff0c1d2-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"CoreOS","product":{"name":"CoreOS Products","product_id":"CSAFPID-1ff0f9e0-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"s2n","product":{"name":"s2n Products","product_id":"CSAFPID-1ff13c48-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Belkin Inc.","product":{"name":"Belkin Inc. Products","product_id":"CSAFPID-1ff1735c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Comcast","product":{"name":"Comcast Products","product_id":"CSAFPID-1ff1ac0a-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Openwall GNU/*/Linux","product":{"name":"Openwall GNU/*/Linux Products","product_id":"CSAFPID-1ff1e58a-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Zyxel","product":{"name":"Zyxel Products","product_id":"CSAFPID-1ff22ff4-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Extreme Networks","product":{"name":"Extreme Networks Products","product_id":"CSAFPID-1ff2b5b4-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ACCESS","product":{"name":"ACCESS Products","product_id":"CSAFPID-1ff2f1fa-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"m0n0wall","product":{"name":"m0n0wall Products","product_id":"CSAFPID-1ff344ca-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Juniper Networks","product":{"name":"Juniper Networks Products","product_id":"CSAFPID-1ff38336-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Turbolinux","product":{"name":"Turbolinux Products","product_id":"CSAFPID-1ff3db88-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Motorola Inc.","product":{"name":"Motorola Inc. Products","product_id":"CSAFPID-1ff41b34-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Google","product":{"name":"Google Products","product_id":"CSAFPID-1ff44dde-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"PePLink","product":{"name":"PePLink Products","product_id":"CSAFPID-1ff49870-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Tizen","product":{"name":"Tizen Products","product_id":"CSAFPID-1ff4f590-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"DesktopBSD","product":{"name":"DesktopBSD Products","product_id":"CSAFPID-1ff545b8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Geexbox","product":{"name":"Geexbox Products","product_id":"CSAFPID-1ff58b2c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"TDS Telecom","product":{"name":"TDS Telecom Products","product_id":"CSAFPID-1ff5dbf4-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-1ff622d0-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fortinet ","product":{"name":"Fortinet  Products","product_id":"CSAFPID-1ff658a4-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Nexenta","product":{"name":"Nexenta Products","product_id":"CSAFPID-1ff685c2-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"XigmaNAS","product":{"name":"XigmaNAS Products","product_id":"CSAFPID-1ff6b240-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"D-Link Systems Inc.","product":{"name":"D-Link Systems Inc. Products","product_id":"CSAFPID-1ff6e9e0-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Nokia","product":{"name":"Nokia Products","product_id":"CSAFPID-1ff71f46-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Micro Focus","product":{"name":"Micro Focus Products","product_id":"CSAFPID-1ff74804-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"pfSense","product":{"name":"pfSense Products","product_id":"CSAFPID-1ff79084-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Avaya Inc.","product":{"name":"Avaya Inc. Products","product_id":"CSAFPID-1ff7c91e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NEC Corporation","product":{"name":"NEC Corporation Products","product_id":"CSAFPID-1ff80fbe-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"eero","product":{"name":"eero Products","product_id":"CSAFPID-1ff853b6-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Sierra Wireless","product":{"name":"Sierra Wireless Products","product_id":"CSAFPID-1ff895ba-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Amazon","product":{"name":"Amazon Products","product_id":"CSAFPID-1ff8df02-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Ruckus Wireless","product":{"name":"Ruckus Wireless Products","product_id":"CSAFPID-1ff9296c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Illumos","product":{"name":"Illumos Products","product_id":"CSAFPID-1ff9645e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Technicolor","product":{"name":"Technicolor Products","product_id":"CSAFPID-1ff99bea-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Microsoft","product":{"name":"Microsoft Products","product_id":"CSAFPID-1ff9d09c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"F5 Networks Inc.","product":{"name":"F5 Networks Inc. Products","product_id":"CSAFPID-1ffa07e2-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AT&T","product":{"name":"AT&T Products","product_id":"CSAFPID-1ffa3136-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"LANCOM Systems GmbH","product":{"name":"LANCOM Systems GmbH Products","product_id":"CSAFPID-1ffa6692-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Alpine Linux","product":{"name":"Alpine Linux Products","product_id":"CSAFPID-1ffaa0f8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Quantenna Communications","product":{"name":"Quantenna Communications Products","product_id":"CSAFPID-1ffad7ee-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Netgear Inc.","product":{"name":"Netgear Inc. Products","product_id":"CSAFPID-1ffb13d0-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ASUSTeK Computer Inc.","product":{"name":"ASUSTeK Computer Inc. Products","product_id":"CSAFPID-1ffb4c42-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"ARRIS","product":{"name":"ARRIS Products","product_id":"CSAFPID-1ffb750a-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"OpenBSD","product":{"name":"OpenBSD Products","product_id":"CSAFPID-1ffba890-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"SafeNet","product":{"name":"SafeNet Products","product_id":"CSAFPID-1ffbf048-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-1ffc239c-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Linksys","product":{"name":"Linksys Products","product_id":"CSAFPID-1ffc589e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Cisco","product":{"name":"Cisco Products","product_id":"CSAFPID-1ffc917e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"IBM Corporation","product":{"name":"IBM Corporation Products","product_id":"CSAFPID-1ffcc4c8-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Marconi Inc.","product":{"name":"Marconi Inc. Products","product_id":"CSAFPID-1ffd079e-39e3-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Deutsche Telekom","product":{"name":"Deutsche Telekom Products","product_id":"CSAFPID-1ffd3534-39e3-11f1-8422-122e2785dc9f"}}]}}