Show filters
14 Total Results
Displaying 1-10 of 14
Sort by:
Attacker Value
Unknown
CVE-2025-23406
Disclosure Date: February 14, 2025 (last updated February 14, 2025)
Out-of-bounds read vulnerability caused by improper checking of TCP MSS option values exists in Cente middleware TCP/IP Network Series, which may lead to processing a specially crafted packet to cause the affected product crashed.
0
Attacker Value
Unknown
CVE-2025-23019
Disclosure Date: January 14, 2025 (last updated January 30, 2025)
IPv6-in-IPv4 tunneling (RFC 4213) allows an attacker to spoof and route traffic via an exposed network interface.
0
Attacker Value
Unknown
CVE-2025-23018
Disclosure Date: January 14, 2025 (last updated January 30, 2025)
IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.
0
Attacker Value
Unknown
CVE-2024-28957
Disclosure Date: April 15, 2024 (last updated April 15, 2024)
Generation of predictable identifiers issue exists in Cente middleware TCP/IP Network Series. If this vulnerability is exploited, a remote unauthenticated attacker may interfere communications by predicting some packet header IDs of the device.
0
Attacker Value
Unknown
CVE-2024-28894
Disclosure Date: April 15, 2024 (last updated April 15, 2024)
Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 headers exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.
0
Attacker Value
Unknown
CVE-2024-23911
Disclosure Date: April 15, 2024 (last updated April 15, 2024)
Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.
0
Attacker Value
Unknown
CVE-2022-43501
Disclosure Date: February 10, 2023 (last updated October 08, 2023)
KASAGO TCP/IP stack provided by Zuken Elmic generates ISNs(Initial Sequence Number) for TCP connections from an insufficiently random source. An attacker may be able to determine the ISN of the current or future TCP connections and either hijack existing ones or spoof future ones.
0
Attacker Value
Unknown
CVE-2020-27336
Disclosure Date: December 22, 2020 (last updated November 28, 2024)
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.
0
Attacker Value
Unknown
CVE-2020-27338
Disclosure Date: December 22, 2020 (last updated November 28, 2024)
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper Input Validation in the DHCPv6 client component allows an unauthenticated remote attacker to cause an Out of Bounds Read, and possibly a Denial of Service via adjacent network access.
0
Attacker Value
Unknown
CVE-2020-27337
Disclosure Date: December 22, 2020 (last updated November 28, 2024)
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper Input Validation in the IPv6 component allows an unauthenticated remote attacker to cause an Out of Bounds Write, and possibly a Denial of Service via network access.
0