CVE-2024-23911 (GCVE-0-2024-23911)

Vulnerability from cvelistv5 – Published: 2024-04-15 10:46 – Updated: 2024-08-01 23:13
VLAI?
Summary
Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.
CWE
  • Out-of-bounds read
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cente:ipv6:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ipv6",
            "vendor": "cente",
            "versions": [
              {
                "lessThanOrEqual": "1.51",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cente:ipv6_snmpv2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ipv6_snmpv2",
            "vendor": "cente",
            "versions": [
              {
                "lessThanOrEqual": "2.30",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cente:ipv6_snmpv3:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ipv6_snmpv3",
            "vendor": "cente",
            "versions": [
              {
                "lessThanOrEqual": "2.30",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-23911",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-17T20:27:05.820784Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-17T20:27:09.860Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:13:08.598Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cente.jp/obstacle/4960/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU94016877/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cente IPv6",
          "vendor": "DMG MORI Digital Co., LTD. and NEXT Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.1.51 and earlier"
            }
          ]
        },
        {
          "product": "Cente IPv6 SNMPv2",
          "vendor": "DMG MORI Digital Co., LTD. and NEXT Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.30 and earlier"
            }
          ]
        },
        {
          "product": "Cente IPv6 SNMPv3",
          "vendor": "DMG MORI Digital Co., LTD. and NEXT Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.30 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Out-of-bounds read",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-15T10:46:29.583Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://www.cente.jp/obstacle/4960/"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU94016877/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2024-23911",
    "datePublished": "2024-04-15T10:46:29.583Z",
    "dateReserved": "2024-03-19T01:42:39.688Z",
    "dateUpdated": "2024-08-01T23:13:08.598Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de lectura fuera de los l\\u00edmites causada por una verificaci\\u00f3n incorrecta de los valores de longitud de las opciones en los paquetes IPv6 NDP en la serie de redes TCP/IP del middleware Cente, lo que puede permitir que un atacante no autenticado detenga las operaciones del dispositivo enviando un paquete especialmente manipulado.\"}]",
      "id": "CVE-2024-23911",
      "lastModified": "2024-11-21T08:58:41.573",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
      "published": "2024-04-15T11:15:08.227",
      "references": "[{\"url\": \"https://jvn.jp/en/vu/JVNVU94016877/\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://www.cente.jp/obstacle/4960/\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://jvn.jp/en/vu/JVNVU94016877/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.cente.jp/obstacle/4960/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-23911\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-04-15T11:15:08.227\",\"lastModified\":\"2025-06-30T13:32:36.317\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de lectura fuera de los l\u00edmites causada por una verificaci\u00f3n incorrecta de los valores de longitud de las opciones en los paquetes IPv6 NDP en la serie de redes TCP/IP del middleware Cente, lo que puede permitir que un atacante no autenticado detenga las operaciones del dispositivo enviando un paquete especialmente manipulado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nxtech:cente_ipv6:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.51\",\"matchCriteriaId\":\"5D29307C-6D00-4A45-ACAB-23F7BFEC8EFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nxtech:cente_ipv6_snmpv2:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.30\",\"matchCriteriaId\":\"7937B3BF-CFFD-47A5-A76A-692F4D5F4C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nxtech:cente_ipv6_snmpv3:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.30\",\"matchCriteriaId\":\"EFB0C9DD-AEE3-4C4C-93BD-A717EE4C29E3\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU94016877/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cente.jp/obstacle/4960/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/vu/JVNVU94016877/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cente.jp/obstacle/4960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cente.jp/obstacle/4960/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jvn.jp/en/vu/JVNVU94016877/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:13:08.598Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-23911\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-17T20:27:05.820784Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cente:ipv6:*:*:*:*:*:*:*:*\"], \"vendor\": \"cente\", \"product\": \"ipv6\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.51\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cente:ipv6_snmpv2:*:*:*:*:*:*:*:*\"], \"vendor\": \"cente\", \"product\": \"ipv6_snmpv2\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.30\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cente:ipv6_snmpv3:*:*:*:*:*:*:*:*\"], \"vendor\": \"cente\", \"product\": \"ipv6_snmpv3\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.30\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-17T20:26:48.085Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"DMG MORI Digital Co., LTD. and NEXT Co., Ltd.\", \"product\": \"Cente IPv6\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.1.51 and earlier\"}]}, {\"vendor\": \"DMG MORI Digital Co., LTD. and NEXT Co., Ltd.\", \"product\": \"Cente IPv6 SNMPv2\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.2.30 and earlier\"}]}, {\"vendor\": \"DMG MORI Digital Co., LTD. and NEXT Co., Ltd.\", \"product\": \"Cente IPv6 SNMPv3\", \"versions\": [{\"status\": \"affected\", \"version\": \"Ver.2.30 and earlier\"}]}], \"references\": [{\"url\": \"https://www.cente.jp/obstacle/4960/\"}, {\"url\": \"https://jvn.jp/en/vu/JVNVU94016877/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Out-of-bounds read\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2024-04-15T10:46:29.583Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-23911\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T23:13:08.598Z\", \"dateReserved\": \"2024-03-19T01:42:39.688Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2024-04-15T10:46:29.583Z\", \"assignerShortName\": \"jpcert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…