Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 04 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:wds:*:*:*:*:*:*:*:* cpe:2.3:a:mikrotik:routeros_tftp:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dproxy-nexgen Project
Dproxy-nexgen Project dproxy-nexgen Microsoft Microsoft wds Mikrotik Mikrotik routeros Tftp |
|
| References |
| |
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-04T12:04:51.230Z
Reserved: 2024-03-04T16:29:42.695Z
Link: CVE-2024-2169
Updated: 2024-09-04T12:04:51.230Z
Status : Awaiting Analysis
Published: 2024-03-19T20:15:07.320
Modified: 2024-11-21T09:09:10.397
Link: CVE-2024-2169
OpenCVE Enrichment
No data.
Weaknesses
No weakness.