The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-14305

CVE-2020-14305: Linux Kernel VoIP H.323 DOS Vulnerability

CVE-2020-14305 is a denial of service flaw in Linux Kernel's Voice Over IP H.323 connection tracking that allows remote attackers to crash systems. This article covers technical details, affected versions, and mitigation.

Published: March 4, 2026

CVE-2020-14305 Overview

An out-of-bounds memory write vulnerability exists in the Linux kernel's Voice Over IP H.323 connection tracking functionality. The flaw occurs when handling connections on IPv6 port 1720, allowing an unauthenticated remote attacker to corrupt kernel memory. This vulnerability can be exploited to crash the system, resulting in a denial of service condition. The highest threat from this vulnerability impacts confidentiality, integrity, and system availability.

Critical Impact

Unauthenticated remote attackers can exploit this out-of-bounds write flaw to crash affected Linux systems or potentially achieve arbitrary code execution, threatening the confidentiality, integrity, and availability of the system.

Affected Products

  • Linux Linux Kernel (versions prior to 4.12)
  • NetApp Cloud Backup
  • NetApp A250 Firmware
  • NetApp FAS 500f Firmware
  • NetApp AFF 500f Firmware
  • NetApp SolidFire Baseboard Management Controller Firmware

Discovery Timeline

  • December 2, 2020 - CVE-2020-14305 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2020-14305

Vulnerability Analysis

The vulnerability resides in the Linux kernel's netfilter connection tracking module for H.323 VoIP protocol handling. The H.323 connection tracking helper (nf_conntrack_h323) is responsible for tracking and managing H.323 session states, including call signaling on port 1720. When processing IPv6 traffic on this port, the kernel fails to properly validate buffer boundaries before performing memory write operations.

The out-of-bounds write condition (CWE-787) can be triggered by sending specially crafted network packets to an affected system listening on IPv6 port 1720. Since the vulnerability does not require authentication, any network-accessible attacker can potentially exploit this flaw. Successful exploitation can lead to kernel memory corruption, system crashes, or potentially arbitrary code execution in the kernel context.

Root Cause

The root cause lies in improper boundary checking within the H.323 connection tracking code when handling IPv6 addresses. The kernel module fails to validate the size of incoming data against the allocated buffer space before writing, leading to memory corruption when processing oversized or malformed H.323 signaling messages over IPv6.

Attack Vector

The attack can be performed remotely over the network without requiring any user interaction or authentication. An attacker needs to send malicious H.323 protocol packets to port 1720 (the standard H.323 call signaling port) on an IPv6-enabled system with the nf_conntrack_h323 module loaded. The attack complexity is considered high as specific conditions must be met, including:

  • The target system must have IPv6 enabled
  • The nf_conntrack_h323 kernel module must be loaded
  • Network connectivity to port 1720 must be available

While no public proof-of-concept exploits are currently available, the nature of the vulnerability as a remotely-triggerable kernel memory corruption issue makes it a significant security concern. Detailed technical information can be found in the OpenVZ Bug Report OVZ-7188 and the Netfilter Patch Submission.

Detection Methods for CVE-2020-14305

Indicators of Compromise

  • Unexpected kernel panics or system crashes, particularly when H.323 VoIP traffic is present
  • Kernel log messages indicating memory corruption or invalid memory access in nf_conntrack_h323 module
  • Abnormal network traffic patterns targeting IPv6 port 1720
  • System instability correlating with incoming H.323 signaling attempts

Detection Strategies

  • Monitor kernel logs for oops or panic messages referencing the nf_conntrack_h323 module or netfilter subsystem
  • Implement network intrusion detection rules to identify malformed H.323 packets targeting port 1720 over IPv6
  • Deploy SentinelOne Singularity Platform for real-time kernel-level threat detection and behavioral analysis
  • Audit loaded kernel modules using lsmod to identify systems with nf_conntrack_h323 enabled

Monitoring Recommendations

  • Enable detailed kernel logging to capture early warning signs of exploitation attempts
  • Configure network monitoring to alert on unusual H.323 traffic volume or characteristics, especially over IPv6
  • Implement SentinelOne's endpoint detection capabilities to monitor for kernel-level anomalies and memory corruption indicators
  • Set up automated alerting for system stability issues that may indicate exploitation attempts

How to Mitigate CVE-2020-14305

Immediate Actions Required

  • Update the Linux kernel to version 4.12 or later where the vulnerability has been patched
  • If patching is not immediately possible, disable the nf_conntrack_h323 module if H.323 connection tracking is not required
  • Block or restrict access to port 1720 over IPv6 at the network firewall level
  • Review and apply vendor-specific patches from NetApp for affected storage and BMC firmware

Patch Information

The vulnerability has been addressed in Linux kernel version 4.12 and later. Administrators should apply the latest kernel updates available from their Linux distribution. Additional vendor-specific patches are available:

  • Red Hat Bugzilla ID 1850716 - Red Hat security tracking
  • NetApp Security Advisory ntap-20201210-0004 - NetApp product patches

For the original kernel patch, refer to the Netfilter Patch Submission.

Workarounds

  • Disable the H.323 connection tracking module if not required: modprobe -r nf_conntrack_h323
  • Add the module to the blacklist to prevent automatic loading
  • Implement firewall rules to block inbound IPv6 traffic to port 1720 from untrusted sources
  • Consider disabling IPv6 if not required for business operations
bash
# Disable and blacklist nf_conntrack_h323 module
modprobe -r nf_conntrack_h323
echo "blacklist nf_conntrack_h323" >> /etc/modprobe.d/blacklist.conf

# Block IPv6 traffic to port 1720 using ip6tables
ip6tables -A INPUT -p tcp --dport 1720 -j DROP
ip6tables -A INPUT -p udp --dport 1720 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability1.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-787
  • Technical References
  • OpenVZ Bug Report OVZ-7188

  • Netfilter Patch Submission

  • NetApp Security Advisory ntap-20201210-0004
  • Vendor Resources
  • Red Hat Bugzilla ID 1850716
  • Related CVEs
  • CVE-2026-23446: Linux Kernel aqc111 Driver DoS Vulnerability

  • CVE-2026-23451: Linux Kernel Bonding Driver DoS Flaw

  • CVE-2026-23460: Linux Kernel ROSE Protocol DoS Vulnerability

  • CVE-2026-23459: Linux Kernel DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English