BDU:2024-07913
Vulnerability from fstec - Published: 08.11.2023
VLAI Severity ?
Title
Уязвимость функции Unified Threat Defense операционной системы Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции Unified Threat Defense операционной системы Cisco IOS XE связана с ошибками управления состоянием. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Severity ?
Vendor
Cisco Systems Inc.
Software Name
Cisco IOS XE
Software Version
17.2.1 (Cisco IOS XE), 17.1.1 (Cisco IOS XE), 17.1.1a (Cisco IOS XE), 17.1.1s (Cisco IOS XE), 17.1.2 (Cisco IOS XE), 17.1.1t (Cisco IOS XE), 17.1.3 (Cisco IOS XE), 17.2.1r (Cisco IOS XE), 17.2.1a (Cisco IOS XE), 17.2.1v (Cisco IOS XE), 17.2.2 (Cisco IOS XE), 17.3.1 (Cisco IOS XE), 17.3.1a (Cisco IOS XE), 17.6.1 (Cisco IOS XE), 17.9.1 (Cisco IOS XE), 17.9.1a (Cisco IOS XE), 17.9.1w (Cisco IOS XE), 17.11.1 (Cisco IOS XE), 17.11.1a (Cisco IOS XE), 17.12.1 (Cisco IOS XE), 17.12.1w (Cisco IOS XE), 17.12.1a (Cisco IOS XE), 17.11.99SW (Cisco IOS XE), 17.10.1 (Cisco IOS XE), 17.10.1a (Cisco IOS XE), 17.10.1b (Cisco IOS XE), 17.8.1 (Cisco IOS XE), 17.9.2 (Cisco IOS XE), 17.9.3 (Cisco IOS XE), 17.9.4 (Cisco IOS XE), 17.9.4a (Cisco IOS XE), 17.7.1 (Cisco IOS XE), 17.6.5a (Cisco IOS XE), 17.6.6a (Cisco IOS XE), 17.6.6 (Cisco IOS XE), 17.6.2 (Cisco IOS XE), 17.6.3 (Cisco IOS XE), 17.6.4 (Cisco IOS XE), 17.6.5 (Cisco IOS XE), 17.3.2 (Cisco IOS XE), 17.3.3 (Cisco IOS XE), 17.3.2a (Cisco IOS XE), 17.3.4 (Cisco IOS XE), 17.3.5 (Cisco IOS XE), 17.3.6 (Cisco IOS XE), 17.3.4c (Cisco IOS XE), 17.3.5a (Cisco IOS XE), 17.3.5b (Cisco IOS XE), 17.3.7 (Cisco IOS XE), 17.3.8 (Cisco IOS XE), 17.3.8a (Cisco IOS XE), 17.4.1 (Cisco IOS XE), 17.5.1 (Cisco IOS XE), 17.2.3 (Cisco IOS XE), 17.3.3a (Cisco IOS XE), 17.3.4a (Cisco IOS XE), 17.3.4b (Cisco IOS XE), 17.4.1a (Cisco IOS XE), 17.4.1b (Cisco IOS XE), 17.4.1c (Cisco IOS XE), 17.4.2 (Cisco IOS XE), 17.4.2a (Cisco IOS XE), 17.5.1a (Cisco IOS XE), 17.5.1b (Cisco IOS XE), 17.5.1c (Cisco IOS XE), 17.6.1a (Cisco IOS XE), 17.6.3a (Cisco IOS XE), 17.7.1a (Cisco IOS XE), 17.7.1b (Cisco IOS XE), 17.7.2 (Cisco IOS XE), 17.8.1a (Cisco IOS XE), 17.9.2a (Cisco IOS XE), 17.9.3a (Cisco IOS XE), 17.12.2 (Cisco IOS XE), 17.12.2a (Cisco IOS XE), 17.3.1w (Cisco IOS XE), 17.3.1x (Cisco IOS XE), 17.3.1z (Cisco IOS XE), 17.6.1w (Cisco IOS XE), 17.6.1x (Cisco IOS XE), 17.6.1y (Cisco IOS XE), 17.6.1z (Cisco IOS XE), 17.6.1z1 (Cisco IOS XE), 17.9.1x (Cisco IOS XE), 17.9.1y (Cisco IOS XE), 17.9.1x1 (Cisco IOS XE), 17.9.1y1 (Cisco IOS XE), 17.9.5a (Cisco IOS XE), 17.9.5b (Cisco IOS XE), 17.9.5c (Cisco IOS XE), 17.9.5d (Cisco IOS XE), 17.13.1 (Cisco IOS XE), 17.13.1a (Cisco IOS XE), 17.12.1z2 (Cisco IOS XE), 17.9.5 (Cisco IOS XE)
Possible Mitigations
Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs
Reference
https://nvd.nist.gov/vuln/detail/CVE-2024-20455
https://vuldb.com/?id.278482
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20455
https://vulners.com/cve/CVE-2024-20455
CWE
CWE-371
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "17.2.1 (Cisco IOS XE), 17.1.1 (Cisco IOS XE), 17.1.1a (Cisco IOS XE), 17.1.1s (Cisco IOS XE), 17.1.2 (Cisco IOS XE), 17.1.1t (Cisco IOS XE), 17.1.3 (Cisco IOS XE), 17.2.1r (Cisco IOS XE), 17.2.1a (Cisco IOS XE), 17.2.1v (Cisco IOS XE), 17.2.2 (Cisco IOS XE), 17.3.1 (Cisco IOS XE), 17.3.1a (Cisco IOS XE), 17.6.1 (Cisco IOS XE), 17.9.1 (Cisco IOS XE), 17.9.1a (Cisco IOS XE), 17.9.1w (Cisco IOS XE), 17.11.1 (Cisco IOS XE), 17.11.1a (Cisco IOS XE), 17.12.1 (Cisco IOS XE), 17.12.1w (Cisco IOS XE), 17.12.1a (Cisco IOS XE), 17.11.99SW (Cisco IOS XE), 17.10.1 (Cisco IOS XE), 17.10.1a (Cisco IOS XE), 17.10.1b (Cisco IOS XE), 17.8.1 (Cisco IOS XE), 17.9.2 (Cisco IOS XE), 17.9.3 (Cisco IOS XE), 17.9.4 (Cisco IOS XE), 17.9.4a (Cisco IOS XE), 17.7.1 (Cisco IOS XE), 17.6.5a (Cisco IOS XE), 17.6.6a (Cisco IOS XE), 17.6.6 (Cisco IOS XE), 17.6.2 (Cisco IOS XE), 17.6.3 (Cisco IOS XE), 17.6.4 (Cisco IOS XE), 17.6.5 (Cisco IOS XE), 17.3.2 (Cisco IOS XE), 17.3.3 (Cisco IOS XE), 17.3.2a (Cisco IOS XE), 17.3.4 (Cisco IOS XE), 17.3.5 (Cisco IOS XE), 17.3.6 (Cisco IOS XE), 17.3.4c (Cisco IOS XE), 17.3.5a (Cisco IOS XE), 17.3.5b (Cisco IOS XE), 17.3.7 (Cisco IOS XE), 17.3.8 (Cisco IOS XE), 17.3.8a (Cisco IOS XE), 17.4.1 (Cisco IOS XE), 17.5.1 (Cisco IOS XE), 17.2.3 (Cisco IOS XE), 17.3.3a (Cisco IOS XE), 17.3.4a (Cisco IOS XE), 17.3.4b (Cisco IOS XE), 17.4.1a (Cisco IOS XE), 17.4.1b (Cisco IOS XE), 17.4.1c (Cisco IOS XE), 17.4.2 (Cisco IOS XE), 17.4.2a (Cisco IOS XE), 17.5.1a (Cisco IOS XE), 17.5.1b (Cisco IOS XE), 17.5.1c (Cisco IOS XE), 17.6.1a (Cisco IOS XE), 17.6.3a (Cisco IOS XE), 17.7.1a (Cisco IOS XE), 17.7.1b (Cisco IOS XE), 17.7.2 (Cisco IOS XE), 17.8.1a (Cisco IOS XE), 17.9.2a (Cisco IOS XE), 17.9.3a (Cisco IOS XE), 17.12.2 (Cisco IOS XE), 17.12.2a (Cisco IOS XE), 17.3.1w (Cisco IOS XE), 17.3.1x (Cisco IOS XE), 17.3.1z (Cisco IOS XE), 17.6.1w (Cisco IOS XE), 17.6.1x (Cisco IOS XE), 17.6.1y (Cisco IOS XE), 17.6.1z (Cisco IOS XE), 17.6.1z1 (Cisco IOS XE), 17.9.1x (Cisco IOS XE), 17.9.1y (Cisco IOS XE), 17.9.1x1 (Cisco IOS XE), 17.9.1y1 (Cisco IOS XE), 17.9.5a (Cisco IOS XE), 17.9.5b (Cisco IOS XE), 17.9.5c (Cisco IOS XE), 17.9.5d (Cisco IOS XE), 17.13.1 (Cisco IOS XE), 17.13.1a (Cisco IOS XE), 17.12.1z2 (Cisco IOS XE), 17.9.5 (Cisco IOS XE)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "10.10.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "10.10.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-07913",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-20455",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS XE",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. Cisco IOS XE - Catalyst 8000V Edge, Cisco Systems Inc. Cisco IOS XE - Catalyst 8200 Series Edge, Cisco Systems Inc. Cisco IOS XE - Catalyst 8300 Series Edge, Cisco Systems Inc. Cisco IOS XE - 1000 Series Integrated Services Routers, Cisco Systems Inc. Cisco IOS XE - Catalyst 8500L Edge, Cisco Systems Inc. Cisco IOS XE - Catalyst IR8300 Rugged Series Routers",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Unified Threat Defense \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Cisco IOS XE, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c (CWE-371)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Unified Threat Defense \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Cisco IOS XE \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Cisco, \u0435\u0441\u043b\u0438 \u043d\u0430 \u043d\u0438\u0445 \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Cisco IOS XE \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0430, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d \u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d UTD \u0438 \u0442\u0443\u043d\u043d\u0435\u043b\u0438 SD-WAN \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u044b \u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 IPSec\n\n\u041e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u0435, \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u043b\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 Cisco IOS XE \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0430:\n\nRouter# show platform software device-mode\nDevice Operating-mode: Controller-Managed\n\nDevice-mode bootup status:\n 5/24 23:07:35 System is green\n\nRouter#\n\n\u041e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u0435, \u0432\u043a\u043b\u044e\u0447\u0435\u043d \u043b\u0438 UTD:\n\nRouter# show utd engine standard status \nEngine version : 1.0.19_SV2.9.16.1_XE17.3\nProfile : Cloud-Low\nSystem memory :\n Usage : 6.00 %\n Status : Green\nNumber of engines : 1\n\nEngine Running Health Reason \n===========================================\nEngine(#1): Yes Green None\n=======================================================\n\n\u041e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u0435, \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d \u043b\u0438 \u0442\u0443\u043d\u043d\u0435\u043b\u044c SD-WAN \u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 IPSec:\n\nRouter# show sdwan bfd sessions | include ipsec\n172.16.255.13 300 up mpls mpls 192.168.0.1 192.168.1.1 12366 ipsec 7 1000 0:00:02:50 0\nRouter#",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2024-20455\nhttps://vuldb.com/?id.278482\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20455\nhttps://vulners.com/cve/CVE-2024-20455",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-371",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,6)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…