Impact
A user can trigger excessive spamming traffic against HCL Aftermarket DPC, causing the system to consume considerable bandwidth and processing resources. The resulting resource exhaustion impairs normal service operation, effectively making the application unavailable to legitimate users. The weakness is classified as CWE-799, which is related to the unsafe handling of network load.
Affected Systems
The vulnerability affects HCL Aftermarket DPC, specifically version 1.0.0, as specified with the vendor and product name in the CNA listing.
Risk and Exploitability
The CVSS score of 4.3 denotes a moderate level of severity. While no EPSS score is provided, the lack of an exploitable code example suggests that the exploitability relies mainly on the ability to send high‑volume spam traffic to the target. Inferred from the description, the attack vector is likely through the network, requiring only basic network access to the affected service. The vulnerability is not present in the CISA KEV catalog. Given these factors, effective exploitation would involve flooding the target with malicious or high‑volume requests, leading to denial of service.
OpenCVE Enrichment