Page 2 of 13 results (0.004 seconds)

CVSS: 4.7EPSS: 0%CPEs: 312EXPL: 1

Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers. Las capacidades de filtrado de la red de capa 2, como la protección IPv6 RA o la inspección ARP, pueden omitirse usando combinaciones de encabezados VLAN 0 y encabezados LLC/SNAP • https://blog.champtar.fr/VLAN0_LLC_SNAP https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08 https://kb.cert.org/vuls/id/855201 https://standards.ieee.org/ieee/802.1Q/10323 https://standards.ieee.org/ieee/802.2/1048 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX • CWE-290: Authentication Bypass by Spoofing •

CVSS: 5.9EPSS: 0%CPEs: 22EXPL: 0

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure. El ataque de Bleichenbacher en el relleno PKCS #1 v1.5 para RSA en la expansión del software de la biblioteca de firmware criptográfico STM32 para STM32Cube (UM1924). La vulnerabilidad puede permitir que uno use un ataque de oráculo de Bleichenbacher para descifrar un texto cifrado encriptado al hacer consultas sucesivas al servidor usando la biblioteca vulnerable, resultando en la divulgación de información remota • http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf http://st.com http://x-cube-cryptolib.com https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb https://www.st.com/en/embedded-software/x-cube-cryptolib.html • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.9EPSS: 0%CPEs: 5EXPL: 0

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure. Un ataque de Bleichenbacher en el relleno PKCS#1 versión v1.5 para RSA en las Bibliotecas de Microchip para Aplicaciones en todas las versiones del 26-11-2018 hasta el 26-11-2018. La vulnerabilidad puede permitir a uno usar el ataque de oráculo de Bleichenbacher para descifrar un texto encriptado cifrado al hacer consultas sucesivas al servidor usando la biblioteca vulnerable, resultando en una divulgación de información remota • http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf http://microchip.com https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb https://www.microchip.com/mplab/microchip-libraries-for-applications • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network. • https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key https://my.f5.com/manage/s/article/K42378447 https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html https://www.kb.cert.org/vuls/id/857035 https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf • CWE-521: Weak Password Requirements •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. • http://rhn.redhat.com/errata/RHSA-2017-0817.html http://www.securityfocus.com/bid/95797 http://www.securitytracker.com/id/1038256 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 https://support.f5.com/csp/article/K57211290?utm_source=f5support&amp%3Butm_medium=RSS https://tools.ietf.org/html/draft-ietf-6man-deprecate-atomfrag-generation-08 https://tools.ietf.org/html/rfc8021 https://access.redhat.com/security/cve/CVE-2016-10142 https://bugzilla.redhat.com/show_ • CWE-17: DEPRECATED: Code CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •