{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8451","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2024-09-05T02:53:03.528Z","datePublished":"2024-09-30T06:56:40.972Z","dateUpdated":"2024-09-30T17:32:59.893Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"GS-4210-24PL4C hardware 2.0","vendor":"PLANET Technology","versions":[{"lessThan":"2.305b240719","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"GS-4210-24P2S hardware 3.0","vendor":"PLANET Technology","versions":[{"lessThan":"3.305b240802","status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2024-09-30T06:52:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests, allowing unauthorized remote attackers to exploit this weakness to occupy connection slots and prevent legitimate users from accessing the SSH service."}],"value":"Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests, allowing unauthorized remote attackers to exploit this weakness to occupy connection slots and prevent legitimate users from accessing the SSH service."}],"impacts":[{"capecId":"CAPEC-227","descriptions":[{"lang":"en","value":"CAPEC-227 Sustained Client Engagement"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-280","description":"CWE-280 Improper Handling of Insufficient Permissions or Privileges","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2024-09-30T06:56:40.972Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/tw/cp-132-8051-5048e-1.html"},{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/en/cp-139-8052-ac0ea-2.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later.<br>Update firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later."}],"value":"Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later.\nUpdate firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later."}],"source":{"advisory":"TVN-202409007","discovery":"EXTERNAL"},"title":"PLANET Technology switch devices - SSH server DoS attack","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-30T17:32:47.762349Z","id":"CVE-2024-8451","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-30T17:32:59.893Z"}}]}}