Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2rc-qg2j-54hv

Опубликовано: 16 авг. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 5.9
CVSS3: 5.3

Описание

When performing an online tag generation to devices which communicate using the ControlLogix protocol, a machine-in-the-middle, or a device that is not configured correctly, could deliver a response leading to unrestricted or unregulated resource allocation. This could cause a denial-of-service condition and crash the Kepware application. By default, these functions are turned off, yet they remain accessible for users who recognize and require their advantages.

When performing an online tag generation to devices which communicate using the ControlLogix protocol, a machine-in-the-middle, or a device that is not configured correctly, could deliver a response leading to unrestricted or unregulated resource allocation. This could cause a denial-of-service condition and crash the Kepware application. By default, these functions are turned off, yet they remain accessible for users who recognize and require their advantages.

EPSS

Процентиль: 16%
0.0005
Низкий

5.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-770

Связанные уязвимости

CVSS3: 5.3
nvd
больше 1 года назад

When performing an online tag generation to devices which communicate using the ControlLogix protocol, a machine-in-the-middle, or a device that is not configured correctly, could deliver a response leading to unrestricted or unregulated resource allocation. This could cause a denial-of-service condition and crash the Kepware application. By default, these functions are turned off, yet they remain accessible for users who recognize and require their advantages.

EPSS

Процентиль: 16%
0.0005
Низкий

5.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-770