Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-16598


An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.


Published

2018-12-06T23:29:00.813

Last Modified

2024-11-21T03:53:01.807

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-441

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application amazon amazon_web_services_freertos ≤ 1.3.1 Yes
Application amazon freertos ≤ 10.0.1 Yes

References