An issue discovered in OpenWrt 18.06, 19.07, 21.02, 22.03, and beyond allows off-path attackers to hijack TCP sessions, which could lead to a denial of service, impersonating the client to the server (e.g., for access to files over FTP), and impersonating the server to the client (e.g., to deliver false information from a finance website). This occurs because nf_conntrack_tcp_no_window_check is true by default.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 07 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-203
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-11-07T11:15:57.558Z

Reserved: 2023-04-07T00:00:00

Link: CVE-2023-30312

cve-icon Vulnrichment

Updated: 2024-08-02T14:21:44.933Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-28T22:15:11.247

Modified: 2024-11-21T08:00:00.693

Link: CVE-2023-30312

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses