{"vulnerability": "CVE-2020-25926", "sightings": [{"uuid": "bb75d336-575a-4ae6-a47e-1d850afd6196", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25926", "type": "seen", "source": "https://t.me/cibsecurity/27562", "content": "\u203c CVE-2020-25926 \u203c\n\nThe DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-18T22:17:06.000000Z"}]}