Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-6833

Summary
Assigner-schneider
Assigner Org ID-076d1eb6-cfab-4401-b34d-6dfc2a413bdb
Published At-17 Sep, 2019 | 19:36
Updated At-04 Aug, 2024 | 20:31
Rejected At-
Credits

A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:schneider
Assigner Org ID:076d1eb6-cfab-4401-b34d-6dfc2a413bdb
Published At:17 Sep, 2019 | 19:36
Updated At:04 Aug, 2024 | 20:31
Rejected At:
▼CVE Numbering Authority (CNA)

A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.

Affected Products
Vendor
Schneider Electric SESchneider Electric SE
Product
Magelis HMI Panels
Versions
Affected
  • all versions of HMIGTO
  • all versions of HMISTO
  • all versions of XBTGH
  • all versions of HMIGTU
  • all versions of HMIGTUX
  • all versions of HMISCU
  • all versions of HMISTU
  • all versions of XBTGT
  • all versions of HMIGXO
  • all versions of HMIGXU
Problem Types
TypeCWE IDDescription
CWECWE-754CWE-754 – Improper Check for Unusual or Exceptional Conditions
Type: CWE
CWE ID: CWE-754
Description: CWE-754 – Improper Check for Unusual or Exceptional Conditions
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01
x_refsource_CONFIRM
https://security.cse.iitk.ac.in/responsible-disclosure
x_refsource_MISC
Hyperlink: https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.cse.iitk.ac.in/responsible-disclosure
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01
x_refsource_CONFIRM
x_transferred
https://security.cse.iitk.ac.in/responsible-disclosure
x_refsource_MISC
x_transferred
Hyperlink: https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.cse.iitk.ac.in/responsible-disclosure
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cybersecurity@se.com
Published At:17 Sep, 2019 | 20:15
Updated At:10 Feb, 2020 | 21:53

A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

Schneider Electric SE
schneider-electric
>>hmigto_firmware>>-
cpe:2.3:o:schneider-electric:hmigto_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto1300>>-
cpe:2.3:h:schneider-electric:hmigto1300:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto1310>>-
cpe:2.3:h:schneider-electric:hmigto1310:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto2300>>-
cpe:2.3:h:schneider-electric:hmigto2300:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto2310>>-
cpe:2.3:h:schneider-electric:hmigto2310:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto2315>>-
cpe:2.3:h:schneider-electric:hmigto2315:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto3510>>-
cpe:2.3:h:schneider-electric:hmigto3510:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto4310>>-
cpe:2.3:h:schneider-electric:hmigto4310:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto5310>>-
cpe:2.3:h:schneider-electric:hmigto5310:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto5315>>-
cpe:2.3:h:schneider-electric:hmigto5315:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto6310>>-
cpe:2.3:h:schneider-electric:hmigto6310:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigto6315>>-
cpe:2.3:h:schneider-electric:hmigto6315:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto_firmware>>-
cpe:2.3:o:schneider-electric:hmisto_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto501>>-
cpe:2.3:h:schneider-electric:hmisto501:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto511>>-
cpe:2.3:h:schneider-electric:hmisto511:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto512>>-
cpe:2.3:h:schneider-electric:hmisto512:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto531>>-
cpe:2.3:h:schneider-electric:hmisto531:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto532>>-
cpe:2.3:h:schneider-electric:hmisto532:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto705>>-
cpe:2.3:h:schneider-electric:hmisto705:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto715>>-
cpe:2.3:h:schneider-electric:hmisto715:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmisto735>>-
cpe:2.3:h:schneider-electric:hmisto735:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>xbtgh_firmware>>-
cpe:2.3:o:schneider-electric:xbtgh_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>xbtgh2460>>-
cpe:2.3:h:schneider-electric:xbtgh2460:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigtu_firmware>>-
cpe:2.3:h:schneider-electric:hmigtu_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmig2u>>-
cpe:2.3:h:schneider-electric:hmig2u:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmig3u>>-
cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmig3ufc>>-
cpe:2.3:h:schneider-electric:hmig3ufc:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmig5u>>-
cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmig5u2>>-
cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmig5ufc>>-
cpe:2.3:h:schneider-electric:hmig5ufc:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmig5ul8a>>-
cpe:2.3:h:schneider-electric:hmig5ul8a:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmiscu_firmware>>-
cpe:2.3:o:schneider-electric:hmiscu_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmiscu6a5>>-
cpe:2.3:h:schneider-electric:hmiscu6a5:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmiscu6b5>>-
cpe:2.3:h:schneider-electric:hmiscu6b5:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmiscu8a5>>-
cpe:2.3:h:schneider-electric:hmiscu8a5:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmiscu8b5>>-
cpe:2.3:h:schneider-electric:hmiscu8b5:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmistu_firmware>>-
cpe:2.3:o:schneider-electric:hmistu_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmistu655>>-
cpe:2.3:h:schneider-electric:hmistu655:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmistu655w>>-
cpe:2.3:h:schneider-electric:hmistu655w:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmistu855>>-
cpe:2.3:h:schneider-electric:hmistu855:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmistu855w>>-
cpe:2.3:h:schneider-electric:hmistu855w:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>xbtgt_firmware>>-
cpe:2.3:o:schneider-electric:xbtgt_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>xbtgt2430>>-
cpe:2.3:h:schneider-electric:xbtgt2430:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>xbtgt2930>>-
cpe:2.3:h:schneider-electric:xbtgt2930:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigxo_firmware>>-
cpe:2.3:o:schneider-electric:hmigxo_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigxo>>-
cpe:2.3:h:schneider-electric:hmigxo:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigxu_firmware>>-
cpe:2.3:o:schneider-electric:hmigxu_firmware:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigxu35>>-
cpe:2.3:h:schneider-electric:hmigxu35:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>hmigxu55>>-
cpe:2.3:h:schneider-electric:hmigxu55:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-754Primarynvd@nist.gov
CWE-754Secondarycybersecurity@se.com
CWE ID: CWE-754
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-754
Type: Secondary
Source: cybersecurity@se.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.cse.iitk.ac.in/responsible-disclosurecybersecurity@se.com
N/A
https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01cybersecurity@se.com
Vendor Advisory
Hyperlink: https://security.cse.iitk.ac.in/responsible-disclosure
Source: cybersecurity@se.com
Resource: N/A
Hyperlink: https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01
Source: cybersecurity@se.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

61Records found

CVE-2018-15815
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.17% / 38.05%
||
7 Day CHG~0.00%
Published-26 Mar, 2019 | 19:03
Updated-05 Aug, 2024 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FastStone Image Viewer 6.5 has an Exception Handler Chain Corrupted issue starting at image00400000+0x00000000003ef68a via a crafted image file.

Action-Not Available
Vendor-faststonen/a
Product-image_viewern/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-26197
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 48.90%
||
7 Day CHG~0.00%
Published-10 Jun, 2021 | 22:14
Updated-03 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in JerryScript 2.4.0. There is a SEGV in main_print_unhandled_exception in main-utils.c file.

Action-Not Available
Vendor-jerryscriptn/a
Product-jerryscriptn/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2022-35473
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.15%
||
7 Day CHG~0.00%
Published-16 Aug, 2022 | 20:12
Updated-03 Aug, 2024 | 09:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fe9a7.

Action-Not Available
Vendor-otfcc_projectn/a
Product-otfccn/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2018-7287
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-33.11% / 96.75%
||
7 Day CHG~0.00%
Published-22 Feb, 2018 | 00:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop).

Action-Not Available
Vendor-n/aDigium, Inc.
Product-asteriskn/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2019-9633
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.65% / 70.00%
||
7 Day CHG~0.00%
Published-08 Mar, 2019 | 07:00
Updated-04 Aug, 2024 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).

Action-Not Available
Vendor-n/aThe GNOME Project
Product-glibn/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2022-35469
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.15%
||
7 Day CHG~0.00%
Published-16 Aug, 2022 | 20:12
Updated-03 Aug, 2024 | 09:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OTFCC v0.10.4 was discovered to contain a segmentation violation via /x86_64-linux-gnu/libc.so.6+0xbb384.

Action-Not Available
Vendor-otfcc_projectn/a
Product-otfccn/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-21285
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.97%
||
7 Day CHG~0.00%
Published-02 Feb, 2021 | 17:55
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Docker daemon crash during image pull of malicious image

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

Action-Not Available
Vendor-mobyNetApp, Inc.Debian GNU/LinuxDocker, Inc.
Product-dockerdebian_linuxe-series_santricity_os_controllermoby
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-31364
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.22% / 45.04%
||
7 Day CHG~0.00%
Published-19 Oct, 2021 | 18:16
Updated-17 Sep, 2024 | 01:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: SRX Series: The flowd process will crash if log session-close is configured and specific traffic is received

An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traffic to cause a crash of the flowd/srxpfe process, responsible for traffic forwarding in SRX, which will cause a Denial of Service (DoS). Continued receipt and processing of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue can only occur when specific packets are trying to create the same session and logging for session-close is configured as a policy action. Affected platforms are: SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2. Not affected platforms are: SRX4000 Series, SRX5000 Series with SPC3, and vSRX Series. This issue affects Juniper Networks Junos OS SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2: All versions prior to 17.4R3-S5; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-srx345srx5400srx5800srx380srx550srx300srx340srx320srx5600junossrx550_hmsrx5000srx550msrx1500Junos OS
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-0281
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.28% / 50.77%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 20:00
Updated-16 Sep, 2024 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS and Junos OS Evolved: Specific packets can trigger rpd crash when BGP Origin Validation is configured with RPKI

On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 17.3 versions prior to 17.3R3-S12; 17.4 versions prior to 17.4R3-S5; 18.1 versions prior to 18.1R3-S13; 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R2-S8, 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prior to 20.4R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junosJunos OSJunos OS Evolved
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-5925
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-7.5||HIGH
EPSS-0.65% / 69.80%
||
7 Day CHG~0.00%
Published-26 Aug, 2020 | 15:32
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, undisclosed internally generated UDP traffic may cause the Traffic Management Microkernel (TMM) to restart under some circumstances.

Action-Not Available
Vendor-n/aF5, Inc.
Product-big-ip_application_acceleration_managerbig-ip_link_controllerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_servicebig-ip_global_traffic_managerbig-ip_analyticsbig-ip_access_policy_managerbig-ip_domain_name_systembig-ip_local_traffic_managerbig-ip_advanced_firewall_managerbig-ip_application_security_managerBIG-IP
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-3449
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.46% / 62.99%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 18:00
Updated-13 Nov, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Additional Paths Denial of Service Vulnerability

A vulnerability in the Border Gateway Protocol (BGP) additional paths feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent authorized users from monitoring the BGP status and cause the BGP process to stop processing new updates, resulting in a denial of service (DOS) condition. The vulnerability is due to an incorrect calculation of lexicographical order when displaying additional path information within Cisco IOS XR Software, which causes an infinite loop. An attacker could exploit this vulnerability by sending a specific BGP update from a BGP neighbor peer session of an affected device; an authorized user must then issue a show bgp command for the vulnerability to be exploited. A successful exploit could allow the attacker to prevent authorized users from properly monitoring the BGP status and prevent BGP from processing new updates, resulting in outdated information in the routing and forwarding tables.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
  • Previous
  • 1
  • 2
  • Next
Details not found