Описание
An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.)
Ссылки
- MitigationThird Party Advisory
- MitigationThird Party Advisory
- Product
- Third Party AdvisoryUS Government Resource
- MitigationThird Party Advisory
- MitigationThird Party Advisory
- Product
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Одновременно
Одновременно
EPSS
9.1 Critical
CVSS3
6.4 Medium
CVSS2
Дефекты
Связанные уязвимости
An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.)
Уязвимость реализации генератора ISN стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю проводить спуфинг-атаки
EPSS
9.1 Critical
CVSS3
6.4 Medium
CVSS2