cve/2024/CVE-2024-23911.md
2025-09-29 21:09:30 +02:00

22 lines
1.1 KiB
Markdown

### [CVE-2024-23911](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23911)
![](https://img.shields.io/static/v1?label=Product&message=Cente%20IPv6%20SNMPv2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Cente%20IPv6%20SNMPv3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Cente%20IPv6&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Ver.1.51%20and%20earlier%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Ver.2.30%20and%20earlier%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20read&color=brightgreen)
### Description
Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.
### POC
#### Reference
- https://www.cente.jp/obstacle/4960/
#### Github
No PoCs found on GitHub currently.