Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-7596

Опубликовано: 14 янв. 2025
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.

An insecure configuration flaw was found in the Generic UDP Encapsulation Protocol. When configured to not require authentication or filtering, this issue could allow a remote unauthenticated attacker to spoof packets or bypass access controls.

Отчет

This vulnerability is rated as Low impact as it requires a known higher risk configuration. Multiple layers of defaults (packet forwarding and these specific protocols) are disabled by default. Red Hat provides guidance in documentation (linked in references section) on how to configure the system in a more secure manner, which avoids the risk of this vulnerability.

Меры по смягчению последствий

See references section for detailed guidance.

Дополнительная информация

Статус:

Low
Дефект:
CWE-348
https://bugzilla.redhat.com/show_bug.cgi?id=2317264networkmanager: UDP encapsulation protocol excessive trust

EPSS

Процентиль: 24%
0.00081
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
около 1 года назад

Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.

CVSS3: 6.5
github
около 1 года назад

Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.

CVSS3: 8.1
fstec
около 1 года назад

Уязвимость протоколов туннелирования GUE, связанная с недостаточной проверкой источника канала связи, позволяющая нарушителю реализовать атаки типа «подмена доверенного объекта»

EPSS

Процентиль: 24%
0.00081
Низкий

5.4 Medium

CVSS3