The network protocol of Blade Shadow though 2.13.3 allows remote attackers to take control of a Shadow instance and execute arbitrary code by only knowing the victim's IP address, because packet data can be injected into the unencrypted UDP packet stream.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:03:32.907Z

Reserved: 2019-09-08T00:00:00

Link: CVE-2019-16110

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-14T17:15:24.913

Modified: 2024-11-21T04:30:04.057

Link: CVE-2019-16110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.