{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-43501","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","dateUpdated":"2025-03-24T18:11:03.974Z","dateReserved":"2022-12-09T00:00:00.000Z","datePublished":"2023-02-10T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2023-02-10T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"KASAGO TCP/IP stack provided by Zuken Elmic generates ISNs(Initial Sequence Number) for TCP connections from an insufficiently random source. An attacker may be able to determine the ISN of the current or future TCP connections and either hijack existing ones or spoof future ones."}],"affected":[{"vendor":"ZUKEN Elmic","product":"Kasago IPv6/v4 Dual","versions":[{"version":"prior to Ver6.0.1.34","status":"affected"}]},{"vendor":"ZUKEN Elmic","product":"Kasago IPv4","versions":[{"version":"prior to Ver6.0.1.34","status":"affected"}]},{"vendor":"ZUKEN Elmic","product":"Kasago IPv4 Light","versions":[{"version":"prior to Ver6.0.1.34","status":"affected"}]},{"vendor":"ZUKEN Elmic","product":"Kasago mobile IPv6","versions":[{"version":"prior to Ver6.0.1.34","status":"affected"}]}],"references":[{"url":"https://www.elwsc.co.jp/news/6352"},{"name":"Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers","tags":["third-party-advisory"],"url":"https://jvn.jp/en/vu/JVNVU99551468/"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-330: Use of Insufficiently Random Values","cweId":"CWE-330"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T13:32:59.196Z"},"title":"CVE Program Container","references":[{"url":"https://www.elwsc.co.jp/news/6352","tags":["x_transferred"]},{"name":"Zuken Elmic KASAGO uses insufficient random values for TCP Initial Sequence Numbers","tags":["third-party-advisory","x_transferred"],"url":"https://jvn.jp/en/vu/JVNVU99551468/"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.1,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-03-24T18:11:00.523781Z","id":"CVE-2022-43501","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-24T18:11:03.974Z"}}]}}