cvelist/2022/43xxx/CVE-2022-43501.json
2023-02-10 04:00:45 +00:00

97 lines
3.5 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-43501",
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ZUKEN Elmic",
"product": {
"product_data": [
{
"product_name": "Kasago IPv6/v4 Dual",
"version": {
"version_data": [
{
"version_value": "prior to Ver6.0.1.34"
}
]
}
},
{
"product_name": "Kasago IPv4",
"version": {
"version_data": [
{
"version_value": "prior to Ver6.0.1.34"
}
]
}
},
{
"product_name": "Kasago IPv4 Light",
"version": {
"version_data": [
{
"version_value": "prior to Ver6.0.1.34"
}
]
}
},
{
"product_name": "Kasago mobile IPv6",
"version": {
"version_data": [
{
"version_value": "prior to Ver6.0.1.34"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-330: Use of Insufficiently Random Values"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.elwsc.co.jp/news/6352",
"refsource": "CONFIRM",
"name": "https://www.elwsc.co.jp/news/6352"
},
{
"url": "https://jvn.jp/en/vu/JVNVU99551468/",
"refsource": "JVN",
"name": "Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "KASAGO TCP/IP stack provided by Zuken Elmic generates ISNs(Initial Sequence Number) for TCP connections from an insufficiently random source. An attacker may be able to determine the ISN of the current or future TCP connections and either hijack existing ones or spoof future ones."
}
]
}
}