Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-6857

Summary
Assigner-schneider
Assigner Org ID-076d1eb6-cfab-4401-b34d-6dfc2a413bdb
Published At-06 Jan, 2020 | 22:57
Updated At-04 Aug, 2024 | 20:31
Rejected At-
Credits

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service of the controller when reading specific memory blocks using Modbus TCP.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:schneider
Assigner Org ID:076d1eb6-cfab-4401-b34d-6dfc2a413bdb
Published At:06 Jan, 2020 | 22:57
Updated At:04 Aug, 2024 | 20:31
Rejected At:
▼CVE Numbering Authority (CNA)

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service of the controller when reading specific memory blocks using Modbus TCP.

Affected Products
Vendor
Schneider Electric SESchneider Electric SE
Product
Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions)
Versions
Affected
  • Modicon M580
  • Modicon M340
  • Modicon Quantum
  • Modicon Premium (see security notification for specific versions)
Problem Types
TypeCWE IDDescription
CWECWE-754CWE-754: Improper Check for Unusual or Exceptional Conditions
Type: CWE
CWE ID: CWE-754
Description: CWE-754: Improper Check for Unusual or Exceptional Conditions
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.se.com/ww/en/download/document/SEVD-2019-344-01
x_refsource_CONFIRM
https://www.us-cert.gov/ics/advisories/icsa-20-016-01
x_refsource_MISC
Hyperlink: https://www.se.com/ww/en/download/document/SEVD-2019-344-01
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.us-cert.gov/ics/advisories/icsa-20-016-01
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.se.com/ww/en/download/document/SEVD-2019-344-01
x_refsource_CONFIRM
x_transferred
https://www.us-cert.gov/ics/advisories/icsa-20-016-01
x_refsource_MISC
x_transferred
Hyperlink: https://www.se.com/ww/en/download/document/SEVD-2019-344-01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.us-cert.gov/ics/advisories/icsa-20-016-01
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cybersecurity@se.com
Published At:06 Jan, 2020 | 23:15
Updated At:03 Feb, 2022 | 15:19

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service of the controller when reading specific memory blocks using Modbus TCP.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Schneider Electric SE
schneider-electric
>>modicon_m580_firmware>>Versions before 2.80(exclusive)
cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>modicon_m580>>-
cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>modicon_m340_firmware>>Versions before 3.01(exclusive)
cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>modicon_m340>>-
cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxh5744m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxh5744m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxh5744m>>-
cpe:2.3:h:schneider-electric:tsxh5744m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxh5724m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxh5724m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxh5724m>>-
cpe:2.3:h:schneider-electric:tsxh5724m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp576634m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp576634m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp576634m_>>-
cpe:2.3:h:schneider-electric:tsxp576634m_:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57554m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57554m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57554m>>-
cpe:2.3:h:schneider-electric:tsxp57554m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp575634m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp575634m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp575634m>>-
cpe:2.3:h:schneider-electric:tsxp575634m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57454m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57454m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57454m>>-
cpe:2.3:h:schneider-electric:tsxp57454m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp574634m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp574634m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp574634m>>-
cpe:2.3:h:schneider-electric:tsxp574634m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57354m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57354m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57354m>>-
cpe:2.3:h:schneider-electric:tsxp57354m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp573634m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp573634m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp573634m>>-
cpe:2.3:h:schneider-electric:tsxp573634m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57304m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57304m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57304m>>-
cpe:2.3:h:schneider-electric:tsxp57304m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57254m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57254m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57254m>>-
cpe:2.3:h:schneider-electric:tsxp57254m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp572634m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp572634m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp572634m>>-
cpe:2.3:h:schneider-electric:tsxp572634m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57204m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57204m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57204m_>>-
cpe:2.3:h:schneider-electric:tsxp57204m_:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp571634m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp571634m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp571634m>>-
cpe:2.3:h:schneider-electric:tsxp571634m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57154m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57154m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57154m>>-
cpe:2.3:h:schneider-electric:tsxp57154m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57104m_firmware>>Versions before 3.20(exclusive)
cpe:2.3:o:schneider-electric:tsxp57104m_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>tsxp57104m>>-
cpe:2.3:h:schneider-electric:tsxp57104m:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu65150_firmware>>Versions before 3.60(exclusive)
cpe:2.3:o:schneider-electric:140cpu65150_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu65150>>-
cpe:2.3:h:schneider-electric:140cpu65150:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu65160_firmware>>Versions before 3.60(exclusive)
cpe:2.3:o:schneider-electric:140cpu65160_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu65160>>-
cpe:2.3:h:schneider-electric:140cpu65160:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu65260_firmware>>Versions before 3.60(exclusive)
cpe:2.3:o:schneider-electric:140cpu65260_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu65260>>-
cpe:2.3:h:schneider-electric:140cpu65260:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67261_firmware>>Versions before 3.60(exclusive)
cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67261>>-
cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67060_firmware>>Versions before 3.60(exclusive)
cpe:2.3:o:schneider-electric:140cpu67060_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67060>>-
cpe:2.3:h:schneider-electric:140cpu67060:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67160_firmware>>Versions before 3.60(exclusive)
cpe:2.3:o:schneider-electric:140cpu67160_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67160>>-
cpe:2.3:h:schneider-electric:140cpu67160:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67261_firmware>>Versions before 3.60(exclusive)
cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>140cpu67261>>-
cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-754Primarynvd@nist.gov
CWE-754Secondarycybersecurity@se.com
CWE ID: CWE-754
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-754
Type: Secondary
Source: cybersecurity@se.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.se.com/ww/en/download/document/SEVD-2019-344-01cybersecurity@se.com
Vendor Advisory
https://www.us-cert.gov/ics/advisories/icsa-20-016-01cybersecurity@se.com
Third Party Advisory
US Government Resource
Hyperlink: https://www.se.com/ww/en/download/document/SEVD-2019-344-01
Source: cybersecurity@se.com
Resource:
Vendor Advisory
Hyperlink: https://www.us-cert.gov/ics/advisories/icsa-20-016-01
Source: cybersecurity@se.com
Resource:
Third Party Advisory
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

210Records found

CVE-2024-52504
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.11% / 29.48%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:16
Updated-12 Aug, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIPROTEC 4 6MD61 (All versions), SIPROTEC 4 6MD63 (All versions), SIPROTEC 4 6MD66 (All versions), SIPROTEC 4 6MD665 (All versions), SIPROTEC 4 7SA522 (All versions), SIPROTEC 4 7SA6 (All versions < V4.78), SIPROTEC 4 7SD5 (All versions < V4.78), SIPROTEC 4 7SD610 (All versions < V4.78), SIPROTEC 4 7SJ61 (All versions), SIPROTEC 4 7SJ62 (All versions), SIPROTEC 4 7SJ63 (All versions), SIPROTEC 4 7SJ64 (All versions), SIPROTEC 4 7SJ66 (All versions), SIPROTEC 4 7SS52 (All versions), SIPROTEC 4 7ST6 (All versions), SIPROTEC 4 7UM61 (All versions), SIPROTEC 4 7UM62 (All versions), SIPROTEC 4 7UT612 (All versions), SIPROTEC 4 7UT613 (All versions), SIPROTEC 4 7UT63 (All versions), SIPROTEC 4 7VE6 (All versions), SIPROTEC 4 7VK61 (All versions), SIPROTEC 4 7VU683 (All versions), SIPROTEC 4 Compact 7RW80 (All versions), SIPROTEC 4 Compact 7SD80 (All versions), SIPROTEC 4 Compact 7SJ80 (All versions), SIPROTEC 4 Compact 7SJ81 (All versions), SIPROTEC 4 Compact 7SK80 (All versions), SIPROTEC 4 Compact 7SK81 (All versions). Affected devices do not properly handle interrupted operations of file transfer. This could allow an unauthenticated remote attacker to cause a denial of service condition. To restore normal operations, the devices need to be restarted.

Action-Not Available
Vendor-Siemens AG
Product-SIPROTEC 4 Compact 7RW80SIPROTEC 4 Compact 7SD80SIPROTEC 4 7VU683SIPROTEC 4 7SA522SIPROTEC 4 6MD63SIPROTEC 4 7SD610SIPROTEC 4 7SA6SIPROTEC 4 7UT612SIPROTEC 4 7UT613SIPROTEC 4 Compact 7SJ80SIPROTEC 4 6MD66SIPROTEC 4 7VK61SIPROTEC 4 Compact 7SK80SIPROTEC 4 6MD61SIPROTEC 4 Compact 7SK81SIPROTEC 4 7ST6SIPROTEC 4 7VE6SIPROTEC 4 7SJ66SIPROTEC 4 6MD665SIPROTEC 4 7SD5SIPROTEC 4 7UT63SIPROTEC 4 7SJ61SIPROTEC 4 7SJ62SIPROTEC 4 7SS52SIPROTEC 4 7SJ63SIPROTEC 4 7UM61SIPROTEC 4 7UM62SIPROTEC 4 Compact 7SJ81SIPROTEC 4 7SJ64
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2024-53432
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 28.32%
||
7 Day CHG~0.00%
Published-21 Nov, 2024 | 00:00
Updated-04 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While parsing certain malformed PLY files, PCL version 1.14.1 crashes due to an uncaught std::out_of_range exception in PCLPointCloud2::at. This issue could potentially be exploited to cause a denial-of-service (DoS) attack when processing untrusted PLY files.

Action-Not Available
Vendor-n/apoint_cloud_library
Product-n/apcl
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2024-47499
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.7||HIGH
EPSS-0.43% / 61.37%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:30
Updated-15 Oct, 2024 | 12:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS and Junos OS Evolved: In a BMP scenario receipt of a malformed AS PATH attribute can cause an RPD crash

An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).  In a scenario where BGP Monitoring Protocol (BMP) is configured with rib-in pre-policy monitoring, receiving a BGP update with a specifically malformed AS PATH attribute over an established BGP session, can cause an RPD crash and restart. This issue affects: Junos OS:  * All versions before 21.2R3-S8, * 21.4 versions before 21.4R3-S8, * 22.2 versions before 22.2R3-S4, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S2, * 23.2 versions before 23.2R2-S1, * 23.4 versions before 23.4R1-S2, 23.4R2; Junos OS Evolved: * All versions before 21.2R3-S8-EVO, * 21.4 versions before 21.4R3-S8-EVO, * 22.2 versions before 22.2R3-S4-EVO, * 22.3 versions before 22.3R3-S3-EVO, * 22.4 versions before 22.4R3-S2-EVO, * 23.2 versions before 23.2R2-S1-EVO, * 23.4 versions before 23.4R1-S2-EVO, 23.4R2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-Junos OSJunos OS Evolvedjunosjunos_evolved
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2024-45650
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 29.17%
||
7 Day CHG+0.01%
Published-31 Jan, 2025 | 15:07
Updated-08 Aug, 2025 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Verify Directory denial of service

IBM Security Verify Directory 10.0 through 10.0.3 is vulnerable to a denial of service when sending an LDAP extended operation.

Action-Not Available
Vendor-IBM Corporation
Product-security_verify_directorySecurity Verify Directory
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2024-36128
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.46% / 63.20%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 14:59
Updated-03 Jan, 2025 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directus is soft-locked by providing a string value to random string util

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.2, providing a non-numeric length value to the random string generation utility will create a memory issue breaking the capability to generate random strings platform wide. This creates a denial of service situation where logged in sessions can no longer be refreshed as sessions depend on the capability to generate a random session ID. This vulnerability is fixed in 10.11.2.

Action-Not Available
Vendor-monospacedirectusmonospace
Product-directusdirectusdirectus
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-1446
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-2.29% / 84.05%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability

A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability can be exploited only by traffic that is sent through an affected device via IPv4 packets. The vulnerability cannot be exploited via IPv6 traffic.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-0281
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.28% / 50.77%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 20:00
Updated-16 Sep, 2024 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS and Junos OS Evolved: Specific packets can trigger rpd crash when BGP Origin Validation is configured with RPKI

On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 17.3 versions prior to 17.3R3-S12; 17.4 versions prior to 17.4R3-S5; 18.1 versions prior to 18.1R3-S13; 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R2-S8, 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prior to 20.4R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junosJunos OSJunos OS Evolved
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-0282
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-7.5||HIGH
EPSS-0.37% / 57.88%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 20:00
Updated-16 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: RPD crash while processing a specific BGP UPDATE when Multipath or add-path features are enabled

On Juniper Networks Junos OS devices with Multipath or add-path feature enabled, processing a specific BGP UPDATE can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this UPDATE message will create a sustained Denial of Service (DoS) condition. This BGP UPDATE message can propagate to other BGP peers with vulnerable Junos versions on which Multipath or add-path feature is enabled, and cause RPD to crash and restart. This issue affects both IBGP and EBGP deployments in IPv4 or IPv6 network. Junos OS devices that do not have the BGP Multipath or add-path feature enabled are not affected by this issue. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S18; 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R3-S3;

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junosJunos OS
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-0286
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.61%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 20:01
Updated-16 Sep, 2024 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS Evolved: Specially crafted packets may cause the AFT manager process to crash and restart

A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) process to crash and restart, impacting all traffic going through the FPC, resulting in a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. Following messages will be logged prior to the crash: Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:32710470974358 label:1089551617 for session:18 probe:35 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:19241453497049 label:1089551617 for session:18 probe:37 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:19241453497049 label:1089551617 for session:18 probe:44 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:32710470974358 label:1089551617 for session:18 probe:47 Feb 2 10:14:39 fpc0 audit[16263]: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16263 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=11 Feb 2 10:14:39 fpc0 kernel: audit: type=1701 audit(1612260879.272:17): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16263 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=1 This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R2-EVO; 21.1 versions prior to 21.1R2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junos_os_evolvedJunos OS Evolved
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-5925
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-7.5||HIGH
EPSS-0.65% / 69.81%
||
7 Day CHG~0.00%
Published-26 Aug, 2020 | 15:32
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, undisclosed internally generated UDP traffic may cause the Traffic Management Microkernel (TMM) to restart under some circumstances.

Action-Not Available
Vendor-n/aF5, Inc.
Product-big-ip_application_acceleration_managerbig-ip_link_controllerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_servicebig-ip_global_traffic_managerbig-ip_analyticsbig-ip_access_policy_managerbig-ip_domain_name_systembig-ip_local_traffic_managerbig-ip_advanced_firewall_managerbig-ip_application_security_managerBIG-IP
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found