Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M use a linear algorithm for selecting the ID value in the header of a DNS query performed on behalf of the device itself, which makes it easier for remote attackers to spoof responses by including this ID value, as demonstrated by a response containing the address of the firmware update server, a different vulnerability than CVE-2015-2914.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/906576 | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/906576 | Patch Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/906576 - Patch, Third Party Advisory, US Government Resource |
Information
Published : 2015-09-21 10:59
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7296
Mitre link : CVE-2015-7296
CVE.ORG link : CVE-2015-7296
JSON object : View
Products Affected
securifi
- almond-2015
- almond_firmware
- almond
- almond-2015_firmware
CWE