CVE-2020-13995

9.8 CRITICAL

📋 TL;DR

CVE-2020-13995 is a critical buffer overflow vulnerability in the U.S. Air Force Sensor Data Management System's extract75 component that allows remote code execution. Attackers can exploit this by providing a malicious NITF file, leading to arbitrary write operations and control of the instruction pointer. Organizations using this specific military system for processing NITF imagery files are affected.

💻 Affected Systems

Products:
  • U.S. Air Force Sensor Data Management System extract75
Versions: All versions prior to patch
Operating Systems: Unknown - likely various military/embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the extract75 component used for parsing NITF (National Imagery Transmission Format) files. Military systems only.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data exfiltration, lateral movement, and persistent access.

🟠

Likely Case

Remote code execution allowing attackers to run arbitrary commands, install malware, or disrupt operations by crashing the extract75 service.

🟢

If Mitigated

Limited impact if proper network segmentation and file validation controls prevent malicious NITF files from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a malicious NITF file. The vulnerability is well-documented with technical details available in public research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - military systems typically have specific update channels

Vendor Advisory: Not publicly available - military systems have restricted advisories

Restart Required: Yes

Instructions:

1. Contact U.S. Air Force cybersecurity/IT support for official patch. 2. Apply security update through authorized military update channels. 3. Restart affected services/systems. 4. Verify fix implementation.

🔧 Temporary Workarounds

Disable extract75 service

linux

Temporarily disable the vulnerable extract75 component if not critically needed

systemctl stop extract75
systemctl disable extract75

Block NITF file processing

all

Implement file filtering to block NITF files from reaching vulnerable systems

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check if extract75 service is running and processing NITF files. Review system logs for extract75 activity.

Check Version:

Contact system administrator or military IT support for version information

Verify Fix Applied:

Contact military cybersecurity support for verification procedures. Test with known safe NITF files after patch application.

📡 Detection & Monitoring

Log Indicators:

  • Multiple extract75 process crashes
  • Unusual NITF file processing patterns
  • Memory access violations in system logs

Network Indicators:

  • Unexpected NITF file transfers to affected systems
  • Network traffic spikes from extract75 systems

SIEM Query:

source="extract75" AND (event_type="crash" OR event_type="memory_violation")

🔗 References

📤 Share & Export