{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2169","assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","state":"PUBLISHED","assignerShortName":"certcc","dateReserved":"2024-03-04T16:29:42.695Z","datePublished":"2024-03-19T19:50:10.700Z","dateUpdated":"2024-09-04T12:04:51.230Z"},"containers":{"cna":{"title":"Implementations of UDP application protocols are susceptible to network loops and denial of service","descriptions":[{"lang":"en","value":"Implementations of UDP application protocol are vulnerable to network loops.   An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources."}],"source":{"discovery":"UNKNOWN"},"credits":[{"lang":"en","type":"finder","value":"Thanks to the reporters Yepeng Pan and Christian Rossow from the CISPA Helmholtz Center for Information Security, Germany."}],"affected":[{"vendor":"MikroTik","product":"RouterOS-TFTP","versions":[{"status":"affected","version":"*","lessThanOrEqual":"7.13.2","versionType":"custom"}]},{"vendor":"Microsoft","product":"WDS","versions":[{"status":"affected","version":"*"}]},{"vendor":"dproxy-nexgen","product":"dproxy-nexgen","versions":[{"status":"affected","version":"0.1","lessThanOrEqual":"0.5","versionType":"custom"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-406: Insufficient Control of Network Message Volume (Network Amplification)"}]}],"references":[{"url":"https://kb.cert.org/vuls/id/417980"},{"url":"https://www.kb.cert.org/vuls/id/417980"}],"x_generator":{"engine":"VINCE 2.1.12","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2024-2169"},"providerMetadata":{"orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc","dateUpdated":"2024-03-19T19:59:53.925Z"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://kb.cert.org/vuls/id/417980","tags":["x_transferred"]},{"url":"https://www.kb.cert.org/vuls/id/417980","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2024/09/04/1"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-09-04T12:04:51.230Z"}},{"affected":[{"vendor":"mikrotik","product":"routeros_tftp","cpes":["cpe:2.3:a:mikrotik:routeros_tftp:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"7.13.2","versionType":"custom"}]},{"vendor":"microsoft","product":"wds","cpes":["cpe:2.3:a:microsoft:wds:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"dproxy-nexgen_project","product":"dproxy-nexgen","cpes":["cpe:2.3:a:dproxy-nexgen_project:dproxy-nexgen:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0.1","status":"affected","lessThanOrEqual":"0.5","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-08-02T16:48:38.161456Z","id":"CVE-2024-2169","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-02T16:53:26.755Z"}}]}}