mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
109 lines
3.4 KiB
JSON
109 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2024-7596",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2025-02-05T18:15:29.470",
|
|
"lastModified": "2025-02-06T22:15:39.853",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors.\r\n\r\nThis can be considered similar to CVE-2020-10136."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Proposed Generic UDP Encapsulation (GUE) (IETF Draft) no valida ni verifica el origen de un paquete de red, lo que permite que un atacante falsifique y enrute tr\u00e1fico arbitrario a trav\u00e9s de una interfaz de red expuesta, lo que puede provocar suplantaci\u00f3n de identidad, omisi\u00f3n del control de acceso y otros comportamientos de red inesperados. Esto puede considerarse similar a CVE-2020-10136."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 3.7
|
|
},
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ietf:generic_udp_encapsulation:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F21F2CB-F6FF-47F1-ABEF-0AA0D883B8C1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://datatracker.ietf.org/doc/draft-ietf-intarea-gue/",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Technical Description",
|
|
"Related"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.rfc-editor.org/rfc/rfc6169.html",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"Technical Description",
|
|
"Related"
|
|
]
|
|
}
|
|
]
|
|
} |