2 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random. En Oryx CycloneTCP 1.9.6, los ISN de TCP son incorrectamente aleatorios. • https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01 https://www.forescout.com https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks • CWE-330: Use of Insufficiently Random Values •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS). To exploit the vulnerability, an attacker needs to have TCP connectivity to the target system. Receiving a maliciously crafted TCP packet from an unauthenticated endpoint is sufficient to trigger the bug. Oryx Embedded CycloneTCP versiones 1.7.6 hasta 2.0.0, corregido en versión 2.0.2, está afectado por una comprobación incorrecta de la entrada, lo que puede causar una denegación de servicio (DoS). Para explotar la vulnerabilidad, un atacante necesitar tener conectividad TCP con el sistema de destino. • https://github.com/Oryx-Embedded/CycloneTCP/commit/de5336016edbe1e90327d0ed1cba5c4e49114366?branch=de5336016edbe1e90327d0ed1cba5c4e49114366&diff=split • CWE-20: Improper Input Validation •