mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
448 lines
12 KiB
JSON
448 lines
12 KiB
JSON
{
|
|
"id": "CVE-2024-24781",
|
|
"sourceIdentifier": "info@cert.vde.com",
|
|
"published": "2024-02-13T14:15:46.780",
|
|
"lastModified": "2024-11-21T08:59:41.280",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An unauthenticated remote attacker can use an uncontrolled resource consumption vulnerability to DoS the affected devices through excessive traffic on a single ethernet port.\u00a0"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Un atacante remoto no autenticado puede utilizar una vulnerabilidad de consumo de recursos incontrolado para DoS en los dispositivos afectados a trav\u00e9s de un tr\u00e1fico excesivo en un \u00fanico puerto Ethernet."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "info@cert.vde.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "info@cert.vde.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f30_03x_yy_\\(com\\)_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "24.14",
|
|
"matchCriteriaId": "4AC64894-A8A8-46D1-BAF2-A911B934A5B1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f30_03x_yy_\\(com\\):-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37ADFAA8-A09E-4499-9BDE-16F19FBCEAA9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f30_03x_yy_\\(cpu\\)_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "18.6",
|
|
"matchCriteriaId": "FF7BA14B-6530-4D8F-A6C3-932719A23BE0"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f30_03x_\\(cpu\\)_yy:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59691D1B-56DC-4D6F-BB5F-B63748F3DEEC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f35_03x_yy_\\(com\\)_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "24.14",
|
|
"matchCriteriaId": "CFA6E487-D234-4880-8046-855511B23880"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f35_03x_yy_\\(com\\)_:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9757960-15A6-49D5-8DC5-203B348F9C45"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f35_03x_yy_\\(cpu\\)_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "18.6",
|
|
"matchCriteriaId": "4308BD95-361E-47E3-80BC-978280F19332"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f35_03x_yy_\\(cpu\\):-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8D2C8E0-5ABC-4A7C-A836-6E16987E3AF7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f60_cpu_03x_yy_\\(com\\)_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "24.14",
|
|
"matchCriteriaId": "26E69E53-B34E-464C-999E-5854EE1A7EE6"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f60_cpu_03x_yy_\\(com\\):-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D684448D-B4ED-4F7D-9E17-CD98EC1CC119"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f60_cpu_03x_yy_\\(cpu\\)_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "18.6",
|
|
"matchCriteriaId": "B63B3B7E-2D66-424A-B8AB-09E4B5C91B07"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f60_cpu_03x_yy_\\(cpu\\):-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC4F45E4-9893-4973-A58E-0B568A2DB31C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f-com_01_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "14.12",
|
|
"matchCriteriaId": "5204C467-33AC-4E0A-9320-F417C7B3D9A7"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f-com_01:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9CA47F7D-81AB-4F9A-85E3-4247DB3AE6E3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:f-cpu_01_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "14.16",
|
|
"matchCriteriaId": "A54AB214-9A91-4353-838A-8D00911C3B25"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:f-cpu_01:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "967A94EF-86C2-4526-83E9-1E562D511D22"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:x-com_01_e_yy_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "15.14",
|
|
"matchCriteriaId": "8AE3C65B-3455-4ED4-AFDF-1767DCB4DC5A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:x-com_01_e_yy:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F86DDB9C-F65E-4319-93AA-BFD021397C81"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:x-com_01_yy_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "14.12",
|
|
"matchCriteriaId": "F531B70C-1C05-47D8-86BD-649C3F118652"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:x-com_01_yy:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09FB79FD-0D7B-4E32-9E1B-B9F6E487D83B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:x-cpu_01_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "14.16",
|
|
"matchCriteriaId": "A42915E6-5D54-485D-8DA3-7CFF4D2F1887"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:x-cpu_01:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8CFADBD8-9E87-46F4-BFAD-F6AC87BA2416"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:x-cpu_31_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "14.16",
|
|
"matchCriteriaId": "C4D22E5E-6FF8-44C5-8D54-75F92129E64E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:x-cpu_31:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7DE3EBDD-0300-47B6-9B11-073AC35FD1AE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hima:x-sb_01_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "7.54",
|
|
"matchCriteriaId": "2A681A70-12B0-47A7-82CF-A70C270DC5B9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hima:x-sb_01:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2DFF1D55-AF2C-4F47-80FE-FF3D313EBC6C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cert.vde.com/en/advisories/VDE-2024-013",
|
|
"source": "info@cert.vde.com",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://cert.vde.com/en/advisories/VDE-2024-013",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |