Vulnerability CVE-2018-16598


Published: 2018-12-06   Modified: 2018-12-07

Description:
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.

Type:

CWE-441

(Unintended Proxy/Intermediary)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Amazon -> Amazon web services freertos 
Amazon -> Freertos 

 References:
https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/
https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/
https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md

Copyright 2024, cxsecurity.com

 

Back to Top