{"vulnerability": "CVE-2024-23814", "sightings": [{"uuid": "f9006b5f-1323-460e-8bf8-ff15c6453a21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23814", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984783226707078", "content": "", "creation_timestamp": "2025-02-11T10:29:24.604102Z"}, {"uuid": "ffc0a0a7-ed6a-4386-9c55-d88be9ac0daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23814", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvjsturqv23", "content": "", "creation_timestamp": "2025-02-11T11:15:35.720988Z"}, {"uuid": "e6bc3fcf-9476-4fb3-a0e8-d87b448956dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23814", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-03", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "112df53a-9d1d-4ab2-a1f8-5e607d12d36a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23814", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "17cd5d8a-6c97-42ec-a901-7ba4b8ae77d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23814", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10890", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23814\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: The integrated ICMP service of the network stack of affected devices can be  forced to exhaust its available memory resources when receiving specially crafted messages targeting IP fragment re-assembly. This could allow an unauthenticated remote attacker to cause a temporary denial of service condition of the ICMP service, other communication services are not affected. Affected devices will resume normal operation after the attack terminates.\n\ud83d\udccf Published: 2025-02-11T10:28:33.403Z\n\ud83d\udccf Modified: 2025-04-08T08:21:59.183Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-769027.html\n2. https://cert-portal.siemens.com/productcert/html/ssa-725549.html", "creation_timestamp": "2025-04-08T08:46:58.000000Z"}]}