BKG Professional NtripCaster 2.0.39 allows querying information over the UDP protocol without authentication. The NTRIP sourcetable is typically quite long (tens of kBs) and can be requested with a packet of only 30 bytes. This presents a vector that can be used for UDP amplification attacks. Normally, only authenticated streaming data will be provided over UDP and not the sourcetable.
References
Link | Resource |
---|---|
https://cve.mahi.be/bkg_ntrip_udp/ | Third Party Advisory |
https://igs.bkg.bund.de/ntrip/bkgcaster | Product Vendor Advisory |
https://cve.mahi.be/bkg_ntrip_udp/ | Third Party Advisory |
https://igs.bkg.bund.de/ntrip/bkgcaster | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://cve.mahi.be/bkg_ntrip_udp/ - Third Party Advisory | |
References | () https://igs.bkg.bund.de/ntrip/bkgcaster - Product, Vendor Advisory |
Information
Published : 2022-11-17 05:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42982
Mitre link : CVE-2022-42982
CVE.ORG link : CVE-2022-42982
JSON object : View
Products Affected
bund
- bkg_professional_ntripcaster
CWE
CWE-306
Missing Authentication for Critical Function