Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:microsoft:wds:*:*:*:*:*:*:*:* cpe:2.3:a:mikrotik:routeros_tftp:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Dproxy-nexgen Project
Dproxy-nexgen Project dproxy-nexgen Microsoft Microsoft wds Mikrotik Mikrotik routeros Tftp |
|
References |
| |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-04T12:04:51.230Z
Reserved: 2024-03-04T16:29:42.695Z
Link: CVE-2024-2169

Updated: 2024-09-04T12:04:51.230Z

Status : Awaiting Analysis
Published: 2024-03-19T20:15:07.320
Modified: 2024-11-21T09:09:10.397
Link: CVE-2024-2169
