An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b
Metrics
Affected Vendors & Products
References
History
Mon, 30 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b | An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b |
Weaknesses | CWE-770 |
MITRE
Status: PUBLISHED
Assigner: Dragos
Published: 2023-08-24T16:09:25.235Z
Updated: 2024-09-30T19:13:20.220Z
Reserved: 2023-08-18T19:31:53.418Z
Link: CVE-2023-40710
Vulnrichment
Updated: 2024-08-02T18:38:51.167Z
NVD
Status : Modified
Published: 2023-08-24T17:15:09.253
Modified: 2024-11-21T08:20:00.593
Link: CVE-2023-40710
Redhat
No data.