All the vulnerabilites related to NEXT Co., LTD. - Cente TCP/IPv4
jvndb-2024-003068
Vulnerability from jvndb
Published
2024-04-05 15:36
Modified
2024-09-24 15:00
Severity ?
Summary
Multiple vulnerabilities in Cente middleware
Details
Some products in Cente middleware TCP/IP Network Series developed by DMG MORI Digital Co., LTD. and provided by NEXT Co., Ltd. contain multiple vulnerabilities listed below.
* Out-of-bounds Read caused by improper checking of the option length values in IPv6 NDP packets (CWE-125)
* Out-of-bounds Read caused by improper checking of the option length values in IPv6 headers (CWE-125)
* Generation of Predictable Identifiers (CWE-340)
DMG MORI Digital Co., LTD. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/vu/JVNVU94016877/index.html | |
JVN | https://jvn.jp/en/vu/JVNVU96959731/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-28957 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-23911 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-28894 | |
ICS-CERT ADVISORY | https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-02 | |
Out-of-bounds Read(CWE-125) | https://cwe.mitre.org/data/definitions/125.html | |
Generation of Predictable Numbers or Identifiers(CWE-340) | https://cwe.mitre.org/data/definitions/340.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
NEXT Co., LTD. | Cente IPv6 | |
NEXT Co., LTD. | Cente TCP/IPv4 |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003068.html", "dc:date": "2024-09-24T15:00+09:00", "dcterms:issued": "2024-04-05T15:36+09:00", "dcterms:modified": "2024-09-24T15:00+09:00", "description": "Some products in Cente middleware TCP/IP Network Series developed by DMG MORI Digital Co., LTD. and provided by NEXT Co., Ltd. contain multiple vulnerabilities listed below.\r\n\r\n * Out-of-bounds Read caused by improper checking of the option length values in IPv6 NDP packets (CWE-125)\r\n * Out-of-bounds Read caused by improper checking of the option length values in IPv6 headers (CWE-125)\r\n * Generation of Predictable Identifiers (CWE-340)\r\n\r\nDMG MORI Digital Co., LTD. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003068.html", "sec:cpe": [ { "#text": "cpe:/a:misc:next_cente_ipv6", "@product": "Cente IPv6", "@vendor": "NEXT Co., LTD.", "@version": "2.2" }, { "#text": "cpe:/a:misc:next_cente_tcp%2Fipv4", "@product": "Cente TCP/IPv4", "@vendor": "NEXT Co., LTD.", "@version": "2.2" } ], "sec:cvss": { "@score": "5.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-003068", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU94016877/index.html", "@id": "JVNVU#94016877", "@source": "JVN" }, { "#text": "https://jvn.jp/en/vu/JVNVU96959731/index.html", "@id": "JVNVU#96959731", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-28957", "@id": "CVE-2024-28957", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-23911", "@id": "CVE-2024-23911", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-28894", "@id": "CVE-2024-28894", "@source": "CVE" }, { "#text": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-02", "@id": "ICSA-24-263-02", "@source": "ICS-CERT ADVISORY" }, { "#text": "https://cwe.mitre.org/data/definitions/125.html", "@id": "CWE-125", "@title": "Out-of-bounds Read(CWE-125)" }, { "#text": "https://cwe.mitre.org/data/definitions/340.html", "@id": "CWE-340", "@title": "Generation of Predictable Numbers or Identifiers(CWE-340)" } ], "title": "Multiple vulnerabilities in Cente middleware" }