"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-12-21 22:01:00 +00:00
parent ae9ef1b1cc
commit 45aea02e6d
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
2 changed files with 2 additions and 2 deletions

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "In version 6.5 of our MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack."
"value": "In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack."
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "In version 6.5 of MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes."
"value": "In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes."
}
]
},