Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cente_ipv6_snmpv3
(Nxtech)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-04-15 | CVE-2024-23911 | Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 NDP packets exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet. | Cente_ipv6, Cente_ipv6_snmpv2, Cente_ipv6_snmpv3 | N/A | ||
2024-04-15 | CVE-2024-28894 | Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 headers exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet. | Cente_ipv6, Cente_ipv6_snmpv2, Cente_ipv6_snmpv3 | N/A | ||
2024-04-15 | CVE-2024-28957 | Generation of predictable identifiers issue exists in Cente middleware TCP/IP Network Series. If this vulnerability is exploited, a remote unauthenticated attacker may interfere communications by predicting some packet header IDs of the device. | Cente_ipv6, Cente_ipv6_snmpv2, Cente_ipv6_snmpv3, Cente_tcp\/ipv4, Cente_tcp\/ipv4_snmpv2, Cente_tcp\/ipv4_snmpv3 | N/A |