Vulnerabilites related to a10networks - advanced_core_operating_system
Vulnerability from fkie_nvd
Published
2018-08-06 20:29
Modified
2024-11-21 04:08
Severity ?
Summary
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", matchCriteriaId: "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", matchCriteriaId: "AF83BB87-B203-48F9-9D06-48A5FE399050", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", matchCriteriaId: "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", matchCriteriaId: "16E6D998-B41D-4B49-9E00-8336D2E40A4A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", matchCriteriaId: "1C8D871B-AEA1-4407-AEE3-47EC782250FF", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", matchCriteriaId: "98381E61-F082-4302-B51F-5648884F998B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "D99A687E-EAE6-417E-A88E-D0082BC194CD", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*", matchCriteriaId: "2EDC8561-5E0A-4692-BB71-C88ED7A1229F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", matchCriteriaId: "6C81647C-9A53-481D-A54C-36770A093F90", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", matchCriteriaId: "44B067C7-735E-43C9-9188-7E1522A02491", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", matchCriteriaId: "A8442C20-41F9-47FD-9A12-E724D3A31FD7", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", matchCriteriaId: "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", matchCriteriaId: "13E02156-E748-4820-B76F-7074793837E1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", matchCriteriaId: "6755B6AD-0422-467B-8115-34A60B1D1A40", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", matchCriteriaId: "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "D5F7E11E-FB34-4467-8919-2B6BEAABF665", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "D6E2A48A-1AFB-4878-AE78-18613DE9334F", versionEndExcluding: "4.18", versionStartIncluding: "4.9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", matchCriteriaId: "0758920B-F8FC-44AB-92E3-CB0B0A5EDA76", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", matchCriteriaId: "81EBA79F-0ABF-4213-8BEF-9A927F9E24D4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", matchCriteriaId: "364BE028-0C54-4254-9261-59D97C0EDC1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", matchCriteriaId: "C5CD0194-46B1-4CCC-9829-8ED014B77660", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", matchCriteriaId: "DB2B91AF-ACE1-4F6F-B2D0-9D4B7D8D20CE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", matchCriteriaId: "30FBD992-DD41-441E-A6C7-D39DAC45DA34", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", matchCriteriaId: "8D305F7A-D159-4716-AB26-5E38BB5CD991", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*", matchCriteriaId: "4A3E8408-DE01-4B3C-9FDF-A51261C524BD", versionEndExcluding: "8.2.7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "0E49DB15-06E7-4709-933E-890A7E65A240", versionEndIncluding: "6.6.9", versionStartIncluding: "6.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A29A8C01-7E4E-4662-B4F3-07DEF07CC600", versionEndIncluding: "6.7.5", versionStartIncluding: "6.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "41E6AF24-0676-4B70-A289-7B81321194DF", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "6BB42D3A-71EE-4367-9F65-86404D74E59D", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "1331467F-B278-485E-AD91-7D0643C2F3DB", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "44E8F4B6-ACF1-4F2C-A2A4-DF7382CCE628", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "195704A8-4911-4A61-8369-711D403052F1", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E5011C2D-FBB5-4117-BB97-11DE70117345", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E866C4E5-D739-4352-9B6D-9753B4C78A24", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "D1FDA72E-991D-4451-9C8E-E738F4D12728", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "DDE5A2D0-C268-4D2D-A001-AEC17E92B1DA", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "79344F94-2CB8-4F08-9373-61614A38476C", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "42D16634-442B-4674-B11E-6748D28764BD", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "622C877B-760A-4C50-9FDF-998C010B864E", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "7FA10863-C4C8-4658-8EEA-BC71B3522F36", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E5D00EED-F95D-4458-BDC4-3390DE85348B", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "1D91EC11-DD9A-434B-9EB4-14AA0E977D8D", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "292EC144-CBA2-4275-9F70-4ED65A505B39", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E6EC3436-7FAE-4311-8103-7ADBAF40E1C1", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "397AC4A5-B67C-483B-84F7-8CB294BB460C", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "E697E4FD-1882-4BF8-9B9F-FB7DFD19497B", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "80509490-50DA-42F8-8A4A-A6F6B95649BA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "18A39E28-E7BB-47A3-988B-4EBF070D3538", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "1466F808-2596-4028-8884-27EDD5CACB47", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "394DF290-9328-4FAD-B04E-61F62B916148", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "D7BBEC67-BD2E-49D5-8294-977D975D98D0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "D931BC21-AF80-400C-A7E9-2C4AB19D748A", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1.", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "6A11E433-943D-4D92-B45E-3FA268094278", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "96AA67E0-3471-4699-87A7-E47DD8E313B8", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "BB76D898-4C7C-40E9-8539-E2A1BC7A5A66", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "8C3C9586-D4ED-4486-9C1F-B357F34F8A84", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "D4C3D6F5-D94D-46A3-991C-A11275B59F8E", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "6114B091-1612-4EA2-81D4-2E5455A345F7", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "86D68F26-EF89-4016-BD3A-637951752AAA", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "9F002114-483A-462C-B0BD-4E1591009935", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "57CCB85A-6F90-4DB7-B0F8-AE5250E1DCFE", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "36F60067-2623-42F9-8B4F-C24F3268DDB9", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "ADAD6E9A-F8B5-4B2D-B687-AEAB518B8F19", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "6DE3443E-9D07-4A82-B110-02ADDA9FDEF3", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "60189636-02D6-44CA-BE2A-7777E3C409CD", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "68E2840B-96F4-4437-91D1-4AFE99E54D6A", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "23E592A7-B530-4932-A81D-D1B9ABD64047", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5D08BA8F-4949-47EC-8EEF-312DC70043B8", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "47D07AA7-1E0E-4FC3-B8BF-05729619B0AA", versionEndIncluding: "12.1.3", versionStartIncluding: "12.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "A197CF35-47EE-4DAE-BC51-90663870B9B9", versionEndIncluding: "13.1.1", versionStartExcluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "8E734E1C-A92F-4394-8F33-4429161BE47C", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "4C9A0A9D-40AF-46DC-B577-DA73B4C2970B", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "5AD75094-3248-4D37-969E-75272F6F31D6", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "15F4D416-10F4-4C08-A25D-0795F7FE0FBE", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7CF10213-FBE4-47A5-8EF2-B45BF15BEB6D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "A36B6B7D-3900-43D4-B241-E58A1377B4DF", versionEndIncluding: "11.6.3", versionStartIncluding: "11.5.1", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "E7860523-E8B3-4BEE-853A-6F0B5BCDDA5A", versionEndIncluding: "12.1.3", versionStartIncluding: "12.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "D6944128-3A30-4835-A125-3EA7571D7DC0", versionEndIncluding: "13.1.1", versionStartIncluding: "13.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*", matchCriteriaId: "A5A85C15-B821-4992-9B06-45767E7467D2", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "A87510FE-775A-44FB-9792-074CD5DE5C38", versionEndIncluding: "5.1.0", versionStartIncluding: "5.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*", matchCriteriaId: "0B5497D9-9022-4788-87DB-6C4B4116509A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*", matchCriteriaId: "BB85F4D0-A104-4954-8D73-B9980C8E93E0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*", matchCriteriaId: "CECB4DA3-3842-4102-8451-43EC00CBAEA8", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*", matchCriteriaId: "3D286AC5-DB3E-4FAE-8441-A4D98B1F1160", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*", matchCriteriaId: "8DE427D5-6E9A-4AC3-830D-7D235DE97389", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*", matchCriteriaId: "F32591D5-D7F6-4C45-B1B5-1D1F8C649DF0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "032B2E4E-381E-4662-A6CF-8FA517233681", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*", matchCriteriaId: "BA708DD0-8A88-4B2B-9B57-A08491DE4696", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "0013CA3E-0E73-45EA-B2E9-7EA038BAB336", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*", matchCriteriaId: "F993C993-D118-45A3-9F95-382B54E25439", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*", matchCriteriaId: "7E53CEDB-F536-4DA0-917C-C220A3102B90", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*", matchCriteriaId: "27A026D0-AA0D-417A-A06B-8785E5FFCBC9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*", matchCriteriaId: "31DF55CF-FEDE-43DE-8F55-3264DB7CDD71", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*", matchCriteriaId: "1A4C837B-4648-4764-B190-36381EE7E664", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*", matchCriteriaId: "F044DA47-D8FA-4EF9-B28C-C69D0DE8C3DC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*", matchCriteriaId: "E600BCEC-2466-4348-ACE3-955469AA1C9E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*", matchCriteriaId: "AB8DD876-7E51-43A9-8944-B4DEE9E9EDD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*", matchCriteriaId: "431A3000-D903-4B57-9B54-CC650105B044", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*", matchCriteriaId: "E8E7428A-D2A5-4B77-8562-F75BB8C72976", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*", matchCriteriaId: "84E53549-337C-423F-AB34-F2559C1F225C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "EABDA6F4-99E7-4354-9760-E9891B47DC8A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:network_assurance_engine:2.1\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "BD40D143-B4B4-4C2A-8D9E-D928459FC59E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*", matchCriteriaId: "B2B5B87A-CECF-48BF-833E-6E4A6DF647CC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*", matchCriteriaId: "F6A108A5-ADB1-4328-B3C0-9C3CC2CD1346", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*", matchCriteriaId: "AE0F9723-F9BD-422D-8414-040C01C9C0D0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*", matchCriteriaId: "4B534882-60A5-4098-A439-A47CBC546E53", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*", matchCriteriaId: "DB1C3395-1865-4436-81E0-3821B5BB99D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*", matchCriteriaId: "86ACAFA3-7F76-428A-A6EE-87284FB30B01", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*", matchCriteriaId: "8908328C-FC17-4BDC-B369-36942225DFAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*", matchCriteriaId: "988EDFD9-4652-4460-BE48-62219B8A0A6D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*", matchCriteriaId: "BD9DD18A-43B9-4B43-AF9F-236D42651E46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*", matchCriteriaId: "177FA398-F812-4E8D-99A3-3F7E0F690CE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*", matchCriteriaId: "4A8F173C-2D38-42B2-B86F-72B53A96D05D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*", matchCriteriaId: "27E03126-0FF6-4D4E-8766-A4F0B20741AC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*", matchCriteriaId: "F24CB2EC-A79E-4C56-8F03-86D53A9B28A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*", matchCriteriaId: "C4F2333B-BE03-4D6C-AA16-1E3EB170496E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*", matchCriteriaId: "B199BF45-F9EF-49A0-B2D5-9B9FA6AA1208", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*", matchCriteriaId: "2C65475E-2641-404B-8316-6B6A5029617D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", }, { lang: "es", value: "El kernel de Linux en versiones 4.9 y siguientes pueden forzarse a realizar llamadas muy caras a tcp_collapse_ofo_queue() y tcp_prune_ofo_queue() para cada paquete entrante, lo que puede conducir a una denegación de servicio.", }, ], id: "CVE-2018-5390", lastModified: "2024-11-21T04:08:43.610", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-08-06T20:29:01.570", references: [ { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", }, { source: "cret@cert.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/06/28/2", }, { source: "cret@cert.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/3", }, { source: "cret@cert.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/4", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104976", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041424", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041434", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2384", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2395", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2402", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2403", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2645", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2776", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2785", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2789", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2790", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2791", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2924", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2933", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2948", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", }, { source: "cret@cert.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180815-0003/", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K95343321", }, { source: "cret@cert.org", url: "https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3732-1/", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3732-2/", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3741-1/", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3741-2/", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3742-1/", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3742-2/", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3763-1/", }, { source: "cret@cert.org", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4266", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/962459", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "cret@cert.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/support/security/Synology_SA_18_41", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/06/28/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104976", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041424", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041434", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2384", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2395", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2402", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2403", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2645", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2776", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2785", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2789", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2790", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2791", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2924", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2933", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:2948", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180815-0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K95343321", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3732-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3732-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3741-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3741-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3742-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3742-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3763-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4266", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/962459", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/support/security/Synology_SA_18_41", }, ], sourceIdentifier: "cret@cert.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "cret@cert.org", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-06-06 18:15
Modified
2024-11-21 09:11
Severity ?
Summary
A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.
The specific flaw exists within the CsrRequestView class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of a10user. Was ZDI-CAN-22517.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:-:*:*:*:*:*:*", matchCriteriaId: "9631578F-ECEA-4215-B00E-79E89E191A09", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1:*:*:*:*:*:*", matchCriteriaId: "B958B188-D5AF-44C9-9BCC-2CCA005B98A4", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p1:*:*:*:*:*:*", matchCriteriaId: "0883D4AC-8C5B-458A-876F-CF570EEB0146", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p10:*:*:*:*:*:*", matchCriteriaId: "6DFFBBF2-E1FC-4B42-A1CD-B3FB67906D4D", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p11:*:*:*:*:*:*", matchCriteriaId: "AC015A07-1951-46AB-8466-27BA76060E3C", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p12:*:*:*:*:*:*", matchCriteriaId: "EF8058B1-CA56-4DAD-9655-7EF7B16430B7", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p13:*:*:*:*:*:*", matchCriteriaId: "0DBCE7ED-3E64-4976-915C-5BA16C2DACDF", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p2:*:*:*:*:*:*", matchCriteriaId: "BAF71588-C4F2-48F5-8D0C-D5B5E073D435", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p3:*:*:*:*:*:*", matchCriteriaId: "54E848B1-5691-4724-BD9F-0734ED3203DE", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p4:*:*:*:*:*:*", matchCriteriaId: "CDAFED8E-268B-417B-ACB0-DD13B0B4F98E", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p5:*:*:*:*:*:*", matchCriteriaId: "40FDFFC6-6CA9-4A9B-9B5F-8060A17F3B61", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p6:*:*:*:*:*:*", matchCriteriaId: "AFE9F160-FEEE-4541-AED2-2596E66B3232", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p7:*:*:*:*:*:*", matchCriteriaId: "9FA649CA-A839-4226-86D5-054A4866E0A1", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p8:*:*:*:*:*:*", matchCriteriaId: "20693C67-0BA2-492D-BEF5-D030ADE01BD4", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p9:*:*:*:*:*:*", matchCriteriaId: "6245D321-25B0-4A6B-9B3F-77B7FE36FCA3", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*", matchCriteriaId: "F993C993-D118-45A3-9F95-382B54E25439", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p2:*:*:*:*:*:*", matchCriteriaId: "A07BA640-B5C1-43AF-8AF9-949A46CB01B0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p3:*:*:*:*:*:*", matchCriteriaId: "C51A689A-8334-4997-ADB9-3420B40D4366", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:-:*:*:*:*:*:*", matchCriteriaId: "B414EAFE-FB76-4B64-8781-E2653A38D9F2", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p3:*:*:*:*:*:*", matchCriteriaId: "912D9FD6-D52E-42FA-9CF3-D84955E9907D", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p4:*:*:*:*:*:*", matchCriteriaId: "B3A46FE8-F0F5-4E28-A161-53F38FABD96B", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p5:*:*:*:*:*:*", matchCriteriaId: "ED63FC6B-4925-47BE-A41D-9DD3C45A2393", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p6:*:*:*:*:*:*", matchCriteriaId: "9D0CA74D-733A-4F6B-A524-A55E1FBEE390", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:-:*:*:*:*:*:*", matchCriteriaId: "295BC404-0D55-4CCD-B560-F09660A1EBA5", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:p1:*:*:*:*:*:*", matchCriteriaId: "EC60D936-4B5A-4CB1-B026-5E53A9CBA9A0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:-:*:*:*:*:*:*", matchCriteriaId: "17DC4C4E-CEE1-436A-B72F-91CE78465004", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p1:*:*:*:*:*:*", matchCriteriaId: "C0FFF9D4-4301-45E8-B3F2-585322FA5EF1", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p2:*:*:*:*:*:*", matchCriteriaId: "855FA85C-0BAE-404A-B23B-2A4B0044304B", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p3:*:*:*:*:*:*", matchCriteriaId: "96DEFC5B-F240-4614-881C-B0D0C5B61D24", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p4:*:*:*:*:*:*", matchCriteriaId: "3C458DFE-C29E-4B23-8190-056DC60961CB", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p5:*:*:*:*:*:*", matchCriteriaId: "1BF8645F-FAEF-4B80-879E-9E5BB90194C0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p6:*:*:*:*:*:*", matchCriteriaId: "FA988842-7A35-4FDE-8A49-3886317DD562", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p7:*:*:*:*:*:*", matchCriteriaId: "E9E299E7-5509-4A39-99DA-5E25751C7598", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p8:*:*:*:*:*:*", matchCriteriaId: "AC39BD39-6DE5-44F7-9EB3-7CE6A3C3788A", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p9:*:*:*:*:*:*", matchCriteriaId: "A3894037-A372-4333-8F67-1FE3C051F4FD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:-:*:*:*:*:*:*", matchCriteriaId: "BF4A10A8-6188-4A78-B9D8-81860AE5DE87", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p1:*:*:*:*:*:*", matchCriteriaId: "AA78B990-1FAF-44C6-B3D9-0D8B5BD43E66", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2:*:*:*:*:*:*", matchCriteriaId: "5D97ECCE-3444-4C6B-A762-DFEFC258B7E3", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2-sp1:*:*:*:*:*:*", matchCriteriaId: "7DC9B659-3801-451A-9F91-BB24B4B9DA4C", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0563C77A-38A5-4A57-A861-C343F04A0246", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:-:*:*:*:*:*:*", matchCriteriaId: "F0E9CC13-3322-4125-BC9B-3BDE06CAEE34", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:p1:*:*:*:*:*:*", matchCriteriaId: "B44E3F7E-6960-4C1A-B741-039382EAA335", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.3:-:*:*:*:*:*:*", matchCriteriaId: "ED618378-2172-4835-AF85-3C9327EC36EF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the CsrRequestView class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of a10user. Was ZDI-CAN-22517.", }, { lang: "es", value: "Vulnerabilidad de ejecución remota de código de inyección de comando en A10 Thunder ADC CsrRequestView. Esta vulnerabilidad permite a atacantes remotos ejecutar código arbitrario en instalaciones afectadas de A10 Thunder ADC. Se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro de la clase CsrRequestView. El problema se debe a la falta de validación adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto de un usuario. Era ZDI-CAN-22517.", }, ], id: "CVE-2024-30368", lastModified: "2024-11-21T09:11:47.493", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-06-06T18:15:13.443", references: [ { source: "zdi-disclosures@trendmicro.com", tags: [ "Vendor Advisory", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, { source: "zdi-disclosures@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-524/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-524/", }, ], sourceIdentifier: "zdi-disclosures@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-10 14:15
Modified
2024-11-21 05:14
Severity ?
Summary
A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384 | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384 | Mitigation, Patch, Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:a10networks:agalaxy:*:*:*:*:*:*:*:*", matchCriteriaId: "5500256E-D48A-458D-ACCD-04CFFF02E865", versionEndIncluding: "3.2.4", versionStartIncluding: "3.2.1", vulnerable: true, }, { criteria: "cpe:2.3:a:a10networks:agalaxy:*:*:*:*:*:*:*:*", matchCriteriaId: "43397743-A284-41A8-972D-61BB362C4DA3", versionEndExcluding: "5.0.5", versionStartIncluding: "5.0.1", vulnerable: true, }, { criteria: "cpe:2.3:a:a10networks:agalaxy:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "EE9B56DC-D45A-416E-AAC0-09B2D9D2CE93", vulnerable: true, }, { criteria: "cpe:2.3:a:a10networks:agalaxy:3.0.4:p3:*:*:*:*:*:*", matchCriteriaId: "34AD3D63-8524-422A-8CE4-392DE6F74104", vulnerable: true, }, { criteria: "cpe:2.3:a:a10networks:agalaxy:5.0.5:-:*:*:*:*:*:*", matchCriteriaId: "BC41B226-C249-4677-89CB-3787BD8F3B52", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:-:*:*:*:*:*:*", matchCriteriaId: "6514C456-8CA5-4939-A80C-6A3081CC64F0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p8:*:*:*:*:*:*", matchCriteriaId: "28642F62-91FB-4F92-A4D1-53985F26FC75", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.3:-:*:*:*:*:*:*", matchCriteriaId: "07E749B1-1A78-47B8-9BD4-0B5B6D95DBCE", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.3:p5:*:*:*:*:*:*", matchCriteriaId: "9F305ADC-1134-4803-96FB-57C14822AF6B", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.4:-:*:*:*:*:*:*", matchCriteriaId: "41F51E66-E577-424F-B74B-F306D49A802B", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.4:p5:*:*:*:*:*:*", matchCriteriaId: "6EC8374A-A278-4263-80F3-746A887FBE82", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.5:-:*:*:*:*:*:*", matchCriteriaId: "0ACFE471-EF10-4157-9236-13D6FEE298F7", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.5:p1:*:*:*:*:*:*", matchCriteriaId: "7A22D257-3230-40BB-B50A-DD96EC5966AB", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.0.0:-:*:*:*:*:*:*", matchCriteriaId: "20BA3258-B0A2-4A89-800B-2A9F4AC05761", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.0.1:p3:*:*:*:*:*:*", matchCriteriaId: "E5DEA310-5EDE-4212-9D16-3067666A16FB", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:-:*:*:*:*:*:*", matchCriteriaId: "18D0BE5E-B432-4F69-B6E9-EFF68AB04E86", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p13:*:*:*:*:*:*", matchCriteriaId: "4F4DC16D-4484-4C81-8F6C-288BD87A2073", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:-:*:*:*:*:*:*", matchCriteriaId: "00FBA24A-2494-4C8C-A55F-5B215C4C18F7", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p13:sp1:*:*:*:*:*", matchCriteriaId: "778A9624-7995-44E8-926C-82A3601DAD24", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:-:*:*:*:*:*:*", matchCriteriaId: "FD6BD1B0-D2A9-464E-945F-DEB1A7F944AD", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p5:sp1:*:*:*:*:*", matchCriteriaId: "181C5A1C-19B7-4C19-AAFC-B417EA1C8CF9", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:-:*:*:*:*:*:*", matchCriteriaId: "9631578F-ECEA-4215-B00E-79E89E191A09", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p4:sp1:*:*:*:*:*", matchCriteriaId: "DFAA40FD-6A6C-45A7-81DE-2824FC972FBF", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.100:-:*:*:*:*:*:*", matchCriteriaId: "AC830D1C-11B9-4E2F-BB61-532D731E74F1", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.100:p7:*:*:*:*:*:*", matchCriteriaId: "39207A9E-8C7A-477C-A6EA-CCB68FF0F8E2", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:-:*:*:*:*:*:*", matchCriteriaId: "B414EAFE-FB76-4B64-8781-E2653A38D9F2", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p3:*:*:*:*:*:*", matchCriteriaId: "912D9FD6-D52E-42FA-9CF3-D84955E9907D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected.", }, { lang: "es", value: "Las Interfaces de Usuario Graficas (GUIs) de administración de A10 Networks ACOS y aGalaxy, presentan una vulnerabilidad de Ejecución de Código Remota (RCE) no autenticada que podría ser usada para comprometer los sistemas ACOS afectados. Las versiones de ACOS 3.2.x (incluyendo y posteriores a 3.2.2), versiones 4.x y 5.1.x están afectadas. aGalaxy versiones 3.0.x, 3.2.x y 5.0.x están afectadas", }, ], id: "CVE-2020-24384", lastModified: "2024-11-21T05:14:42.827", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-10T14:15:10.617", references: [ { source: "cve@mitre.org", tags: [ "Mitigation", "Patch", "Vendor Advisory", ], url: "https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Patch", "Vendor Advisory", ], url: "https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-06-05 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
Buffer overflow in A10 Networks Advanced Core Operating System (ACOS) before 2.7.0-p6 and 2.7.1 before 2.7.1-P1_55 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long session id in the URI to sys_reboot.html. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
a10networks | advanced_core_operating_system | 2.7.0 | |
a10networks | advanced_core_operating_system | 2.7.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:2.7.0:*:*:*:*:*:*:*", matchCriteriaId: "D11EA558-D7A5-4DEE-A649-E58AF4133F19", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:2.7.1:*:*:*:*:*:*:*", matchCriteriaId: "026CF77A-2FD5-466E-98F8-F2B10935508D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in A10 Networks Advanced Core Operating System (ACOS) before 2.7.0-p6 and 2.7.1 before 2.7.1-P1_55 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long session id in the URI to sys_reboot.html. NOTE: some of these details are obtained from third party information.", }, { lang: "es", value: "Desbordamiento de buffer en A10 Networks Advanced Core Operating System (ACOS) anterior a 2.7.0-p6 y 2.7.1 anterior a 2.7.1-P1_55 permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de una sesión id larga en la URI en sys_reboot.html. NOTA: algunos de estos detalles se obtienen de información de terceras partes.", }, ], id: "CVE-2014-3976", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-06-05T17:55:08.870", references: [ { source: "cve@mitre.org", url: "http://osvdb.org/show/osvdb/105354", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://seclists.org/fulldisclosure/2014/Apr/16", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/57640", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.exploit-db.com/exploits/32702", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/66588", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/show/osvdb/105354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://seclists.org/fulldisclosure/2014/Apr/16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/57640", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.exploit-db.com/exploits/32702", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/66588", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-02-08 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
A10 AX1030 and possibly other devices with software before 2.7.2-P8 uses random GCM nonce generations, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging a reused nonce in a session and a "forbidden attack," a similar issue to CVE-2016-0270.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
a10networks | advanced_core_operating_system | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:*:p7:*:*:*:*:*:*", matchCriteriaId: "E32CA8C6-D959-40E5-B2E8-ED020D270536", versionEndIncluding: "2.7.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A10 AX1030 and possibly other devices with software before 2.7.2-P8 uses random GCM nonce generations, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging a reused nonce in a session and a \"forbidden attack,\" a similar issue to CVE-2016-0270.", }, { lang: "es", value: "A10 AX1030 y posiblemente otros dispositivos con software en versiones anteriores a 2.7.2-P8 utiliza generaciones aleatorias de GCM nonce, lo que facilita a atacantes remotos obtener la clave de autenticación y suplantar datos aprovechando un nonce reutilizado en una sesión y un \"ataque prohibido\", un problema similar a CVE-2016-0270.", }, ], id: "CVE-2016-10213", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-02-08T16:59:00.227", references: [ { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/96163", }, { source: "cve@mitre.org", url: "https://github.com/nonce-disrespect/nonce-disrespect", }, { source: "cve@mitre.org", url: "https://www.a10networks.com/blog/cve-2016-0270-gcm-nonce-vulnerability", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/96163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/nonce-disrespect/nonce-disrespect", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.a10networks.com/blog/cve-2016-0270-gcm-nonce-vulnerability", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-06-06 18:15
Modified
2024-11-21 09:11
Severity ?
Summary
A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:-:*:*:*:*:*:*", matchCriteriaId: "9631578F-ECEA-4215-B00E-79E89E191A09", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1:*:*:*:*:*:*", matchCriteriaId: "B958B188-D5AF-44C9-9BCC-2CCA005B98A4", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p1:*:*:*:*:*:*", matchCriteriaId: "0883D4AC-8C5B-458A-876F-CF570EEB0146", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p10:*:*:*:*:*:*", matchCriteriaId: "6DFFBBF2-E1FC-4B42-A1CD-B3FB67906D4D", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p11:*:*:*:*:*:*", matchCriteriaId: "AC015A07-1951-46AB-8466-27BA76060E3C", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p12:*:*:*:*:*:*", matchCriteriaId: "EF8058B1-CA56-4DAD-9655-7EF7B16430B7", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p13:*:*:*:*:*:*", matchCriteriaId: "0DBCE7ED-3E64-4976-915C-5BA16C2DACDF", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p2:*:*:*:*:*:*", matchCriteriaId: "BAF71588-C4F2-48F5-8D0C-D5B5E073D435", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p3:*:*:*:*:*:*", matchCriteriaId: "54E848B1-5691-4724-BD9F-0734ED3203DE", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p4:*:*:*:*:*:*", matchCriteriaId: "CDAFED8E-268B-417B-ACB0-DD13B0B4F98E", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p5:*:*:*:*:*:*", matchCriteriaId: "40FDFFC6-6CA9-4A9B-9B5F-8060A17F3B61", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p6:*:*:*:*:*:*", matchCriteriaId: "AFE9F160-FEEE-4541-AED2-2596E66B3232", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p7:*:*:*:*:*:*", matchCriteriaId: "9FA649CA-A839-4226-86D5-054A4866E0A1", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p8:*:*:*:*:*:*", matchCriteriaId: "20693C67-0BA2-492D-BEF5-D030ADE01BD4", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:gr1-p9:*:*:*:*:*:*", matchCriteriaId: "6245D321-25B0-4A6B-9B3F-77B7FE36FCA3", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*", matchCriteriaId: "F993C993-D118-45A3-9F95-382B54E25439", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p2:*:*:*:*:*:*", matchCriteriaId: "A07BA640-B5C1-43AF-8AF9-949A46CB01B0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p3:*:*:*:*:*:*", matchCriteriaId: "C51A689A-8334-4997-ADB9-3420B40D4366", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:-:*:*:*:*:*:*", matchCriteriaId: "B414EAFE-FB76-4B64-8781-E2653A38D9F2", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p3:*:*:*:*:*:*", matchCriteriaId: "912D9FD6-D52E-42FA-9CF3-D84955E9907D", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p4:*:*:*:*:*:*", matchCriteriaId: "B3A46FE8-F0F5-4E28-A161-53F38FABD96B", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p5:*:*:*:*:*:*", matchCriteriaId: "ED63FC6B-4925-47BE-A41D-9DD3C45A2393", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.1.0:p6:*:*:*:*:*:*", matchCriteriaId: "9D0CA74D-733A-4F6B-A524-A55E1FBEE390", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:-:*:*:*:*:*:*", matchCriteriaId: "295BC404-0D55-4CCD-B560-F09660A1EBA5", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.0:p1:*:*:*:*:*:*", matchCriteriaId: "EC60D936-4B5A-4CB1-B026-5E53A9CBA9A0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:-:*:*:*:*:*:*", matchCriteriaId: "17DC4C4E-CEE1-436A-B72F-91CE78465004", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p1:*:*:*:*:*:*", matchCriteriaId: "C0FFF9D4-4301-45E8-B3F2-585322FA5EF1", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p2:*:*:*:*:*:*", matchCriteriaId: "855FA85C-0BAE-404A-B23B-2A4B0044304B", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p3:*:*:*:*:*:*", matchCriteriaId: "96DEFC5B-F240-4614-881C-B0D0C5B61D24", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p4:*:*:*:*:*:*", matchCriteriaId: "3C458DFE-C29E-4B23-8190-056DC60961CB", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p5:*:*:*:*:*:*", matchCriteriaId: "1BF8645F-FAEF-4B80-879E-9E5BB90194C0", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p6:*:*:*:*:*:*", matchCriteriaId: "FA988842-7A35-4FDE-8A49-3886317DD562", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p7:*:*:*:*:*:*", matchCriteriaId: "E9E299E7-5509-4A39-99DA-5E25751C7598", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p8:*:*:*:*:*:*", matchCriteriaId: "AC39BD39-6DE5-44F7-9EB3-7CE6A3C3788A", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:5.2.1:p9:*:*:*:*:*:*", matchCriteriaId: "A3894037-A372-4333-8F67-1FE3C051F4FD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:-:*:*:*:*:*:*", matchCriteriaId: "BF4A10A8-6188-4A78-B9D8-81860AE5DE87", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p1:*:*:*:*:*:*", matchCriteriaId: "AA78B990-1FAF-44C6-B3D9-0D8B5BD43E66", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2:*:*:*:*:*:*", matchCriteriaId: "5D97ECCE-3444-4C6B-A762-DFEFC258B7E3", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.0:p2-sp1:*:*:*:*:*:*", matchCriteriaId: "7DC9B659-3801-451A-9F91-BB24B4B9DA4C", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0563C77A-38A5-4A57-A861-C343F04A0246", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:-:*:*:*:*:*:*", matchCriteriaId: "F0E9CC13-3322-4125-BC9B-3BDE06CAEE34", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.2:p1:*:*:*:*:*:*", matchCriteriaId: "B44E3F7E-6960-4C1A-B741-039382EAA335", vulnerable: true, }, { criteria: "cpe:2.3:o:a10networks:advanced_core_operating_system:6.0.3:-:*:*:*:*:*:*", matchCriteriaId: "ED618378-2172-4835-AF85-3C9327EC36EF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754.", }, { lang: "es", value: "Vulnerabilidad de escalada de privilegios locales de asignación de permisos incorrecta en A10 Thunder ADC. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de A10 Thunder ADC. Un atacante primero debe obtener la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder aprovechar esta vulnerabilidad. La falla específica existe dentro del instalador. El problema se debe a permisos incorrectos en un archivo. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar código arbitrario en el contexto de la raíz. Era ZDI-CAN-22754.", }, ], id: "CVE-2024-30369", lastModified: "2024-11-21T09:11:47.653", metrics: { cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-06-06T18:15:13.720", references: [ { source: "zdi-disclosures@trendmicro.com", tags: [ "Vendor Advisory", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, { source: "zdi-disclosures@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-525/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-525/", }, ], sourceIdentifier: "zdi-disclosures@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-732", }, ], source: "zdi-disclosures@trendmicro.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-732", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
CVE-2020-24384 (GCVE-0-2020-24384)
Vulnerability from cvelistv5
Published
2020-11-10 13:46
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected.
References
▼ | URL | Tags |
---|---|---|
https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:12:08.651Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-10T13:46:34", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-24384", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384", refsource: "CONFIRM", url: "https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24384", datePublished: "2020-11-10T13:46:34", dateReserved: "2020-08-18T00:00:00", dateUpdated: "2024-08-04T15:12:08.651Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2024-30369 (GCVE-0-2024-30369)
Vulnerability from cvelistv5
Published
2024-06-06 17:53
Modified
2024-08-02 01:32
Severity ?
EPSS score ?
Summary
A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-525/ | x_research-advisory | |
https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
A10 | Thunder ADC |
Version: 6.0.2, build 68 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:a10networks:thunder_adc:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "thunder_adc", vendor: "a10networks", versions: [ { lessThan: "6.0.3-p1", status: "affected", version: "6.0.0", versionType: "custom", }, { lessThan: "5.2.1-p10", status: "affected", version: "5.1.0", versionType: "custom", }, { lessThan: "4.1.4-gr1-p14", status: "affected", version: "4.1.4", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-30369", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-06T19:06:03.019548Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-06T19:30:08.524Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:32:07.045Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "ZDI-24-525", tags: [ "x_research-advisory", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-525/", }, { name: "vendor-provided URL", tags: [ "vendor-advisory", "x_transferred", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Thunder ADC", vendor: "A10", versions: [ { status: "affected", version: "6.0.2, build 68", }, ], }, ], dateAssigned: "2024-03-26T14:40:42.708-05:00", datePublic: "2024-05-29T15:09:26.200-05:00", descriptions: [ { lang: "en", value: "A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754.", }, ], metrics: [ { cvssV3_0: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-732", description: "CWE-732: Incorrect Permission Assignment for Critical Resource", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-06T17:53:01.730Z", orgId: "99f1926a-a320-47d8-bbb5-42feb611262e", shortName: "zdi", }, references: [ { name: "ZDI-24-525", tags: [ "x_research-advisory", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-525/", }, { name: "vendor-provided URL", tags: [ "vendor-advisory", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, ], source: { lang: "en", value: "Anonymous", }, title: "A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability", }, }, cveMetadata: { assignerOrgId: "99f1926a-a320-47d8-bbb5-42feb611262e", assignerShortName: "zdi", cveId: "CVE-2024-30369", datePublished: "2024-06-06T17:53:01.730Z", dateReserved: "2024-03-26T18:52:36.418Z", dateUpdated: "2024-08-02T01:32:07.045Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-10213 (GCVE-0-2016-10213)
Vulnerability from cvelistv5
Published
2017-02-08 16:00
Modified
2024-08-06 03:14
Severity ?
EPSS score ?
Summary
A10 AX1030 and possibly other devices with software before 2.7.2-P8 uses random GCM nonce generations, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging a reused nonce in a session and a "forbidden attack," a similar issue to CVE-2016-0270.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nonce-disrespect/nonce-disrespect | x_refsource_MISC | |
https://www.a10networks.com/blog/cve-2016-0270-gcm-nonce-vulnerability | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/96163 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T03:14:42.817Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/nonce-disrespect/nonce-disrespect", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.a10networks.com/blog/cve-2016-0270-gcm-nonce-vulnerability", }, { name: "96163", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/96163", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-17T00:00:00", descriptions: [ { lang: "en", value: "A10 AX1030 and possibly other devices with software before 2.7.2-P8 uses random GCM nonce generations, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging a reused nonce in a session and a \"forbidden attack,\" a similar issue to CVE-2016-0270.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-02-28T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/nonce-disrespect/nonce-disrespect", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.a10networks.com/blog/cve-2016-0270-gcm-nonce-vulnerability", }, { name: "96163", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/96163", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-10213", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A10 AX1030 and possibly other devices with software before 2.7.2-P8 uses random GCM nonce generations, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging a reused nonce in a session and a \"forbidden attack,\" a similar issue to CVE-2016-0270.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/nonce-disrespect/nonce-disrespect", refsource: "MISC", url: "https://github.com/nonce-disrespect/nonce-disrespect", }, { name: "https://www.a10networks.com/blog/cve-2016-0270-gcm-nonce-vulnerability", refsource: "CONFIRM", url: "https://www.a10networks.com/blog/cve-2016-0270-gcm-nonce-vulnerability", }, { name: "96163", refsource: "BID", url: "http://www.securityfocus.com/bid/96163", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-10213", datePublished: "2017-02-08T16:00:00", dateReserved: "2017-02-08T00:00:00", dateUpdated: "2024-08-06T03:14:42.817Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2014-3976 (GCVE-0-2014-3976)
Vulnerability from cvelistv5
Published
2014-06-05 17:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Buffer overflow in A10 Networks Advanced Core Operating System (ACOS) before 2.7.0-p6 and 2.7.1 before 2.7.1-P1_55 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long session id in the URI to sys_reboot.html. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html | x_refsource_MISC | |
http://www.exploit-db.com/exploits/32702 | exploit, x_refsource_EXPLOIT-DB | |
http://seclists.org/fulldisclosure/2014/Apr/16 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/66588 | vdb-entry, x_refsource_BID | |
http://osvdb.org/show/osvdb/105354 | vdb-entry, x_refsource_OSVDB | |
http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax | x_refsource_MISC | |
http://secunia.com/advisories/57640 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:57:18.213Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html", }, { name: "32702", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "http://www.exploit-db.com/exploits/32702", }, { name: "20140402 [Quantum Leap Advisory] #QLA140402 - A10 Networks remote Buffer Overflow", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Apr/16", }, { name: "66588", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/66588", }, { name: "105354", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/show/osvdb/105354", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax", }, { name: "57640", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/57640", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-04-02T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in A10 Networks Advanced Core Operating System (ACOS) before 2.7.0-p6 and 2.7.1 before 2.7.1-P1_55 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long session id in the URI to sys_reboot.html. NOTE: some of these details are obtained from third party information.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2015-05-01T14:57:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html", }, { name: "32702", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "http://www.exploit-db.com/exploits/32702", }, { name: "20140402 [Quantum Leap Advisory] #QLA140402 - A10 Networks remote Buffer Overflow", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Apr/16", }, { name: "66588", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/66588", }, { name: "105354", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/show/osvdb/105354", }, { tags: [ "x_refsource_MISC", ], url: "http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax", }, { name: "57640", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/57640", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-3976", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in A10 Networks Advanced Core Operating System (ACOS) before 2.7.0-p6 and 2.7.1 before 2.7.1-P1_55 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long session id in the URI to sys_reboot.html. NOTE: some of these details are obtained from third party information.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html", }, { name: "32702", refsource: "EXPLOIT-DB", url: "http://www.exploit-db.com/exploits/32702", }, { name: "20140402 [Quantum Leap Advisory] #QLA140402 - A10 Networks remote Buffer Overflow", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Apr/16", }, { name: "66588", refsource: "BID", url: "http://www.securityfocus.com/bid/66588", }, { name: "105354", refsource: "OSVDB", url: "http://osvdb.org/show/osvdb/105354", }, { name: "http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax", refsource: "MISC", url: "http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax", }, { name: "57640", refsource: "SECUNIA", url: "http://secunia.com/advisories/57640", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-3976", datePublished: "2014-06-05T17:00:00", dateReserved: "2014-06-05T00:00:00", dateUpdated: "2024-08-06T10:57:18.213Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2018-5390 (GCVE-0-2018-5390)
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-05 05:33
Severity ?
EPSS score ?
Summary
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Linux | Linux Kernel |
Version: 4.9 < 4.9* |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T05:33:44.409Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:2785", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2785", }, { name: "VU#962459", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "https://www.kb.cert.org/vuls/id/962459", }, { name: "USN-3741-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3741-2/", }, { name: "RHSA-2018:2776", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2776", }, { name: "RHSA-2018:2933", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2933", }, { name: "RHSA-2018:2403", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2403", }, { name: "RHSA-2018:2395", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2395", }, { name: "USN-3763-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3763-1/", }, { name: "RHSA-2018:2384", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2384", }, { name: "USN-3741-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3741-1/", }, { name: "RHSA-2018:2402", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2402", }, { name: "RHSA-2018:2948", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2948", }, { name: "USN-3742-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3742-2/", }, { name: "1041434", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041434", }, { name: "USN-3732-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3732-2/", }, { name: "104976", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104976", }, { name: "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", }, { name: "1041424", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041424", }, { name: "USN-3742-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3742-1/", }, { name: "RHSA-2018:2924", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2924", }, { name: "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp", }, { name: "RHSA-2018:2789", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2789", }, { name: "DSA-4266", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4266", }, { name: "RHSA-2018:2645", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2645", }, { name: "USN-3732-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3732-1/", }, { name: "RHSA-2018:2791", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2791", }, { name: "RHSA-2018:2790", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2790", }, { name: "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2019/06/28/2", }, { name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/3", }, { name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/4", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20180815-0003/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/support/security/Synology_SA_18_41", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K95343321", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Linux Kernel", vendor: "Linux", versions: [ { lessThan: "4.9*", status: "affected", version: "4.9", versionType: "custom", }, ], }, ], datePublic: "2018-07-23T00:00:00", descriptions: [ { lang: "en", value: "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-15T02:22:59", orgId: "37e5125f-f79b-445b-8fad-9564f167944b", shortName: "certcc", }, references: [ { name: "RHSA-2018:2785", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2785", }, { name: "VU#962459", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "https://www.kb.cert.org/vuls/id/962459", }, { name: "USN-3741-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3741-2/", }, { name: "RHSA-2018:2776", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2776", }, { name: "RHSA-2018:2933", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2933", }, { name: "RHSA-2018:2403", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2403", }, { name: "RHSA-2018:2395", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2395", }, { name: "USN-3763-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3763-1/", }, { name: "RHSA-2018:2384", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2384", }, { name: "USN-3741-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3741-1/", }, { name: "RHSA-2018:2402", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2402", }, { name: "RHSA-2018:2948", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2948", }, { name: "USN-3742-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3742-2/", }, { name: "1041434", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041434", }, { name: "USN-3732-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3732-2/", }, { name: "104976", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104976", }, { name: "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", }, { name: "1041424", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041424", }, { name: "USN-3742-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3742-1/", }, { name: "RHSA-2018:2924", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2924", }, { name: "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp", }, { name: "RHSA-2018:2789", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2789", }, { name: "DSA-4266", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4266", }, { name: "RHSA-2018:2645", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2645", }, { name: "USN-3732-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3732-1/", }, { name: "RHSA-2018:2791", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2791", }, { name: "RHSA-2018:2790", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2790", }, { name: "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2019/06/28/2", }, { name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/3", }, { name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2019/07/06/4", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20180815-0003/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/support/security/Synology_SA_18_41", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K95343321", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", }, ], source: { discovery: "UNKNOWN", }, title: "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cert@cert.org", ID: "CVE-2018-5390", STATE: "PUBLIC", TITLE: "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Linux Kernel", version: { version_data: [ { affected: ">=", version_affected: ">=", version_name: "4.9", version_value: "4.9", }, ], }, }, ], }, vendor_name: "Linux", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:2785", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2785", }, { name: "VU#962459", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/962459", }, { name: "USN-3741-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3741-2/", }, { name: "RHSA-2018:2776", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2776", }, { name: "RHSA-2018:2933", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2933", }, { name: "RHSA-2018:2403", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2403", }, { name: "RHSA-2018:2395", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2395", }, { name: "USN-3763-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3763-1/", }, { name: "RHSA-2018:2384", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2384", }, { name: "USN-3741-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3741-1/", }, { name: "RHSA-2018:2402", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2402", }, { name: "RHSA-2018:2948", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2948", }, { name: "USN-3742-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3742-2/", }, { name: "1041434", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041434", }, { name: "USN-3732-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3732-2/", }, { name: "104976", refsource: "BID", url: "http://www.securityfocus.com/bid/104976", }, { name: "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", }, { name: "1041424", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041424", }, { name: "USN-3742-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3742-1/", }, { name: "RHSA-2018:2924", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2924", }, { name: "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp", }, { name: "RHSA-2018:2789", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2789", }, { name: "DSA-4266", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4266", }, { name: "RHSA-2018:2645", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2645", }, { name: "USN-3732-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3732-1/", }, { name: "RHSA-2018:2791", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2791", }, { name: "RHSA-2018:2790", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2790", }, { name: "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/06/28/2", }, { name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/07/06/3", }, { name: "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/07/06/4", }, { name: "https://www.oracle.com/security-alerts/cpujul2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2020.html", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", refsource: "CONFIRM", url: "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", }, { name: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", refsource: "CONFIRM", url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", }, { name: "https://security.netapp.com/advisory/ntap-20180815-0003/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20180815-0003/", }, { name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", refsource: "CONFIRM", url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", }, { name: "https://www.synology.com/support/security/Synology_SA_18_41", refsource: "CONFIRM", url: "https://www.synology.com/support/security/Synology_SA_18_41", }, { name: "https://support.f5.com/csp/article/K95343321", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K95343321", }, { name: "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", refsource: "CONFIRM", url: "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", }, { name: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", refsource: "CONFIRM", url: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", }, { name: "https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", }, { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", }, ], }, source: { discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b", assignerShortName: "certcc", cveId: "CVE-2018-5390", datePublished: "2018-08-06T20:00:00", dateReserved: "2018-01-12T00:00:00", dateUpdated: "2024-08-05T05:33:44.409Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2024-30368 (GCVE-0-2024-30368)
Vulnerability from cvelistv5
Published
2024-06-06 17:52
Modified
2024-08-02 01:32
Severity ?
EPSS score ?
Summary
A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.
The specific flaw exists within the CsrRequestView class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of a10user. Was ZDI-CAN-22517.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-524/ | x_research-advisory | |
https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
A10 | Thunder ADC |
Version: 6.0.2, build 68 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:a10networks:thunder_adc:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "thunder_adc", vendor: "a10networks", versions: [ { lessThan: "6.0.3-p1", status: "affected", version: "6.0.0", versionType: "custom", }, { lessThan: "5.2.1-p10", status: "affected", version: "5.1.0", versionType: "custom", }, { lessThan: "4.1.4-gr1-p14", status: "affected", version: "4.1.4", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-30368", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-10T14:03:11.116287Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-10T14:03:17.026Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T01:32:07.216Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "ZDI-24-524", tags: [ "x_research-advisory", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-524/", }, { name: "vendor-provided URL", tags: [ "vendor-advisory", "x_transferred", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Thunder ADC", vendor: "A10", versions: [ { status: "affected", version: "6.0.2, build 68", }, ], }, ], dateAssigned: "2024-03-26T14:40:42.702-05:00", datePublic: "2024-05-29T15:09:21.851-05:00", descriptions: [ { lang: "en", value: "A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the CsrRequestView class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of a10user. Was ZDI-CAN-22517.", }, ], metrics: [ { cvssV3_0: { baseScore: 7.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-06T17:52:47.342Z", orgId: "99f1926a-a320-47d8-bbb5-42feb611262e", shortName: "zdi", }, references: [ { name: "ZDI-24-524", tags: [ "x_research-advisory", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-24-524/", }, { name: "vendor-provided URL", tags: [ "vendor-advisory", ], url: "https://support.a10networks.com/support/security_advisory/cve-2024-30368-cve-2024-30369", }, ], source: { lang: "en", value: "Anonymous", }, title: "A10 Thunder ADC CsrRequestView Command Injection Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "99f1926a-a320-47d8-bbb5-42feb611262e", assignerShortName: "zdi", cveId: "CVE-2024-30368", datePublished: "2024-06-06T17:52:47.342Z", dateReserved: "2024-03-26T18:52:36.418Z", dateUpdated: "2024-08-02T01:32:07.216Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }