CVE-2023-34061

Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pivotal:cloud_foundry_deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:cloud_foundry_routing_release:*:*:*:*:*:*:*:*

History

18 Jan 2024, 20:24

Type Values Removed Values Added
References () https://www.cloudfoundry.org/blog/cve-2023-34061-gorouter-route-pruning/ - () https://www.cloudfoundry.org/blog/cve-2023-34061-gorouter-route-pruning/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:pivotal:cloud_foundry_deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:cloud_foundry_routing_release:*:*:*:*:*:*:*:*
CWE CWE-400
First Time Pivotal
Pivotal cloud Foundry Deployment
Pivotal cloud Foundry Routing Release

12 Jan 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-12 07:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-34061

Mitre link : CVE-2023-34061

CVE.ORG link : CVE-2023-34061


JSON object : View

Products Affected

pivotal

  • cloud_foundry_routing_release
  • cloud_foundry_deployment
CWE
CWE-400

Uncontrolled Resource Consumption