Логотип exploitDog
bind:CVE-2020-35685
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-35685

Количество 3

Количество 3

nvd логотип

CVE-2020-35685

больше 4 лет назад

An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.)

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-hf8h-gvq7-6gfr

больше 3 лет назад

An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.)

EPSS: Низкий
fstec логотип

BDU:2021-04218

больше 4 лет назад

Уязвимость реализации генератора ISN стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю проводить спуфинг-атаки

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-35685

An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.)

CVSS3: 9.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-hf8h-gvq7-6gfr

An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.)

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04218

Уязвимость реализации генератора ISN стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю проводить спуфинг-атаки

CVSS3: 7.5
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу