mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
76 lines
2.5 KiB
JSON
76 lines
2.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-7596",
|
|
"ASSIGNER": "cert@cert.org",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors.\r\n\r\nThis can be considered similar to CVE-2020-10136."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-290 Authentication Bypass by Spoofing"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "IETF",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "draft-ietf-intarea-gue-09",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "GUE-09"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://datatracker.ietf.org/doc/draft-ietf-intarea-gue/",
|
|
"refsource": "MISC",
|
|
"name": "https://datatracker.ietf.org/doc/draft-ietf-intarea-gue/"
|
|
},
|
|
{
|
|
"url": "https://www.rfc-editor.org/rfc/rfc6169.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.rfc-editor.org/rfc/rfc6169.html"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "VINCE 3.0.11",
|
|
"env": "prod",
|
|
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-7596"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |