Description
Out-of-bounds read vulnerability caused by improper checking of the option length values in IPv6 headers exists in Cente middleware TCP/IP Network Series, which may allow an unauthenticated attacker to stop the device operations by sending a specially crafted packet.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 30 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nxtech
Nxtech cente Ipv6 Nxtech cente Ipv6 Snmpv2 Nxtech cente Ipv6 Snmpv3 |
|
| CPEs | cpe:2.3:a:nxtech:cente_ipv6:*:*:*:*:*:*:*:* cpe:2.3:a:nxtech:cente_ipv6_snmpv2:*:*:*:*:*:*:*:* cpe:2.3:a:nxtech:cente_ipv6_snmpv3:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Nxtech
Nxtech cente Ipv6 Nxtech cente Ipv6 Snmpv2 Nxtech cente Ipv6 Snmpv3 |
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-02T01:03:50.255Z
Reserved: 2024-03-19T01:42:40.699Z
Link: CVE-2024-28894
Updated: 2024-08-02T01:03:50.255Z
Status : Analyzed
Published: 2024-04-15T11:15:08.440
Modified: 2025-06-30T13:34:04.667
Link: CVE-2024-28894
No data.
OpenCVE Enrichment
No data.
Weaknesses