Description
Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 04 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:wds:*:*:*:*:*:*:*:* cpe:2.3:a:mikrotik:routeros_tftp:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dproxy-nexgen Project
Dproxy-nexgen Project dproxy-nexgen Microsoft Microsoft wds Mikrotik Mikrotik routeros Tftp |
|
| References |
| |
| Metrics |
ssvc
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-04T12:04:51.230Z
Reserved: 2024-03-04T16:29:42.695Z
Link: CVE-2024-2169
Updated: 2024-09-04T12:04:51.230Z
Status : Awaiting Analysis
Published: 2024-03-19T20:15:07.320
Modified: 2024-11-21T09:09:10.397
Link: CVE-2024-2169
OpenCVE Enrichment
No data.
Weaknesses
No weakness.