2024-12-08 03:06:42 +00:00

64 lines
2.3 KiB
JSON

{
"id": "CVE-2024-29155",
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"published": "2024-10-16T16:15:03.630",
"lastModified": "2024-10-16T16:38:14.557",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is \nreceived, the device becomes incapable of completing the pairing \nprocess. A third party can inject a second PairReqNoInputNoOutput request \njust after a real one, causing the pair request to be blocked."
},
{
"lang": "es",
"value": "En los dispositivos Microchip RN4870, cuando se recibe m\u00e1s de una solicitud PairReqNoInputNoOutput consecutiva, el dispositivo no puede completar el proceso de emparejamiento. Un tercero puede inyectar una segunda solicitud PairReqNoInputNoOutput justo despu\u00e9s de una real, lo que hace que la solicitud de emparejamiento se bloquee."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://ww1.microchip.com/downloads/aemDocuments/documents/WSG/ProductDocuments/SoftwareLibraries/Firmware/RN4870-71-Firmware-1.44.zip",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
},
{
"url": "https://www.microchip.com/en-us/product/rn4870",
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
}
]
}