All the vulnerabilites related to ZUKEN ELMIC,INC - KASAGO IPv6/v4 Dual
jvndb-2023-001215
Vulnerability from jvndb
Published
2023-02-13 14:18
Modified
2024-06-14 15:45
Severity ?
Summary
Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers
Details
Zuken Elmic KASAGO, TCP/IP protocol stack for embedded systems, uses its own random number generator function when generating TCP initial sequence numbers, which leads to use insufficient random values (CWE-330).
Zuken Elmic reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/vu/JVNVU99551468/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-43501 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-43501 | |
Use of Insufficiently Random Values(CWE-330) | https://cwe.mitre.org/data/definitions/330.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001215.html", "dc:date": "2024-06-14T15:45+09:00", "dcterms:issued": "2023-02-13T14:18+09:00", "dcterms:modified": "2024-06-14T15:45+09:00", "description": "Zuken Elmic KASAGO, TCP/IP protocol stack for embedded systems, uses its own random number generator function when generating TCP initial sequence numbers, which leads to use insufficient random values (CWE-330).\r\n\r\nZuken Elmic reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-001215.html", "sec:cpe": [ { "#text": "cpe:/a:elwsc:kasago_ipv4", "@product": "KASAGO IPv4", "@vendor": "ZUKEN ELMIC,INC", "@version": "2.2" }, { "#text": "cpe:/a:elwsc:kasago_ipv4_light", "@product": "KASAGO IPv4 Light", "@vendor": "ZUKEN ELMIC,INC", "@version": "2.2" }, { "#text": "cpe:/a:elwsc:kasago_ipv6%2fv4_dual", "@product": "KASAGO IPv6/v4 Dual", "@vendor": "ZUKEN ELMIC,INC", "@version": "2.2" }, { "#text": "cpe:/a:elwsc:kasago_mobile_ipv6", "@product": "KASAGO mobile IPv6", "@vendor": "ZUKEN ELMIC,INC", "@version": "2.2" } ], "sec:cvss": { "@score": "5.9", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "@version": "3.0" }, "sec:identifier": "JVNDB-2023-001215", "sec:references": [ { "#text": "http://jvn.jp/en/vu/JVNVU99551468/index.html", "@id": "JVNVU#99551468", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43501", "@id": "CVE-2022-43501", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43501", "@id": "CVE-2022-43501", "@source": "NVD" }, { "#text": "https://cwe.mitre.org/data/definitions/330.html", "@id": "CWE-330", "@title": "Use of Insufficiently Random Values(CWE-330)" } ], "title": "Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers" }