var-202312-1216
Vulnerability from variot
Dell OS10 Networking Switches running 10.5.2.x and above contain an Uncontrolled Resource Consumption (Denial of Service) vulnerability, when switches are configured with VLT and VRRP. A remote unauthenticated user can cause the network to be flooded leading to Denial of Service for actual network users. This is a high severity vulnerability as it allows an attacker to cause an outage of network. Dell recommends customers to upgrade at the earliest opportunity. Dell's Dell Networking OS10 Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Dell Networking OS10 is a switch made by the American company Dell
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202312-1216", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "networking os10", "scope": "eq", "trust": 1.6, "vendor": "dell", "version": "10.5.5.5" }, { "model": "dell networking os10", "scope": "eq", "trust": 0.8, "vendor": "\u30c7\u30eb", "version": null }, { "model": "dell networking os10", "scope": "eq", "trust": 0.8, "vendor": "\u30c7\u30eb", "version": "10.5.5.5" }, { "model": "dell networking os10", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30eb", "version": null }, { "model": "networking os10 10.5.5.4", "scope": null, "trust": 0.6, "vendor": "dell", "version": null }, { "model": "networking os10", "scope": "eq", "trust": 0.6, "vendor": "dell", "version": "10.5.4.9" }, { "model": "networking os10", "scope": "eq", "trust": 0.6, "vendor": "dell", "version": "10.5.3.8" }, { "model": "networking os10 10.5.4.9", "scope": null, "trust": 0.6, "vendor": "dell", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-00192" }, { "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "db": "NVD", "id": "CVE-2023-39248" } ] }, "cve": "CVE-2023-39248", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2024-00192", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2023-39248", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2023-39248", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-39248", "trust": 1.0, "value": "HIGH" }, { "author": "security_alert@emc.com", "id": "CVE-2023-39248", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2023-39248", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2024-00192", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-00192" }, { "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "db": "NVD", "id": "CVE-2023-39248" }, { "db": "NVD", "id": "CVE-2023-39248" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\nDell OS10 Networking Switches running 10.5.2.x and above contain an Uncontrolled Resource Consumption (Denial of Service) vulnerability, when switches are configured with VLT and VRRP. A remote unauthenticated\u00a0user can cause the network to be flooded leading to Denial of Service for actual network users. This is a high severity vulnerability as it allows an attacker to cause an outage of network. Dell recommends customers to upgrade at the earliest opportunity. Dell\u0027s Dell Networking OS10 Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Dell Networking OS10 is a switch made by the American company Dell", "sources": [ { "db": "NVD", "id": "CVE-2023-39248" }, { "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "db": "CNVD", "id": "CNVD-2024-00192" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-39248", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2023-018959", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-00192", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-00192" }, { "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "db": "NVD", "id": "CVE-2023-39248" } ] }, "id": "VAR-202312-1216", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-00192" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-00192" } ] }, "last_update_date": "2024-08-14T14:23:42.507000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Dell Networking OS10 Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/512966" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-00192" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.0 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "db": "NVD", "id": "CVE-2023-39248" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.dell.com/support/kbdoc/en-us/000220138/dsa-2023-278-dell-networking-os10-security-updates-for-uncontrolled-resource-consumption" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-39248" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-00192" }, { "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "db": "NVD", "id": "CVE-2023-39248" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-00192" }, { "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "db": "NVD", "id": "CVE-2023-39248" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-01-03T00:00:00", "db": "CNVD", "id": "CNVD-2024-00192" }, { "date": "2024-01-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "date": "2023-12-05T06:15:48.667000", "db": "NVD", "id": "CVE-2023-39248" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-01-03T00:00:00", "db": "CNVD", "id": "CNVD-2024-00192" }, { "date": "2024-01-12T02:17:00", "db": "JVNDB", "id": "JVNDB-2023-018959" }, { "date": "2023-12-11T15:33:45.650000", "db": "NVD", "id": "CVE-2023-39248" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dell\u0027s \u00a0Dell\u00a0Networking\u00a0OS10\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-018959" } ], "trust": 0.8 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…