CVE-2015-5987
 
Severity Score
8.6
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Belkin F9K1102 2 devices with firmware 2.10.17 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value.
Dispositivos Belkin F9K1102 2 con firmware 2.10.17 utilizan un algoritmo indebido para seleccionar el valor ID en la cabecera de una consulta DNS, lo que hace más fácil para atacantes remotos falsificar respuestas prediciendo este valor.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2015-08-14 CVE Reserved
- 2015-12-31 CVE Published
- 2023-11-24 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://www.kb.cert.org/vuls/id/201168 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zyxel Search vendor "Zyxel" | Gs1900-10hp Firmware Search vendor "Zyxel" for product "Gs1900-10hp Firmware" | < 2.50\(aazi.0\)c0 Search vendor "Zyxel" for product "Gs1900-10hp Firmware" and version " < 2.50\(aazi.0\)c0" | - |
Affected
| in | Zyxel Search vendor "Zyxel" | Gs1900-10hp Firmware Search vendor "Zyxel" for product "Gs1900-10hp Firmware" | < 2.50\(aazi.0\)c0 Search vendor "Zyxel" for product "Gs1900-10hp Firmware" and version " < 2.50\(aazi.0\)c0" | - |
Safe
|