FKIE_CVE-2024-23814

Vulnerability from fkie_nvd - Published: 2025-02-11 11:15 - Updated: 2025-04-08 09:15
Summary
The integrated ICMP service of the network stack of affected devices can be forced to exhaust its available memory resources when receiving specially crafted messages targeting IP fragment re-assembly. This could allow an unauthenticated remote attacker to cause a temporary denial of service condition of the ICMP service, other communication services are not affected. Affected devices will resume normal operation after the attack terminates.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The integrated ICMP service of the network stack of affected devices can be  forced to exhaust its available memory resources when receiving specially crafted messages targeting IP fragment re-assembly. This could allow an unauthenticated remote attacker to cause a temporary denial of service condition of the ICMP service, other communication services are not affected. Affected devices will resume normal operation after the attack terminates."
    },
    {
      "lang": "es",
      "value": "Se ha identificado una vulnerabilidad en SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (Todas las versiones \u0026lt; V3.0.0), iFeatures de SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (Todas las versiones \u0026lt; V3.0.0), SCALANCE WUM766-1 (EE. UU.) (6GK5766-1GE00-3DB0) (Todas las versiones \u0026lt; V3.0.0). El servicio ICMP integrado de la pila de red de los dispositivos afectados puede verse obligado a agotar sus recursos de memoria disponibles al recibir mensajes especialmente manipulados que tengan como objetivo el reensamblado de fragmentos de IP. Esto podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio temporal del servicio ICMP; otros servicios de comunicaci\u00f3n no se ven afectados. Los dispositivos afectados reanudar\u00e1n su funcionamiento normal una vez que finalice el ataque."
    }
  ],
  "id": "CVE-2024-23814",
  "lastModified": "2025-04-08T09:15:17.187",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "productcert@siemens.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 6.9,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "productcert@siemens.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-02-11T11:15:12.430",
  "references": [
    {
      "source": "productcert@siemens.com",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-725549.html"
    },
    {
      "source": "productcert@siemens.com",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-769027.html"
    }
  ],
  "sourceIdentifier": "productcert@siemens.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "productcert@siemens.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…