Vulnerability Details : CVE-2015-7296
Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M use a linear algorithm for selecting the ID value in the header of a DNS query performed on behalf of the device itself, which makes it easier for remote attackers to spoof responses by including this ID value, as demonstrated by a response containing the address of the firmware update server, a different vulnerability than CVE-2015-2914.
Products affected by CVE-2015-7296
- cpe:2.3:o:securifi:almond-2015_firmware:*:*:*:*:*:*:*:*When used together with: Securifi » Almond-2015
- cpe:2.3:o:securifi:almond_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7296
0.81%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7296
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2015-7296
-
http://www.kb.cert.org/vuls/id/906576
VU#906576 - Securifi Almond routers contains multiple vulnerabilitiesPatch;Third Party Advisory;US Government Resource
Jump to