Vulnerability Details : CVE-2023-38321
OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2023-38321
- cpe:2.3:o:sierrawireless:aleos:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38321
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38321
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | 2024-01-03 |
CWE ids for CVE-2023-38321
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-38321
-
https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2023-006-r3.ashx
Vendor Advisory
-
https://openwrt.org/docs/guide-user/services/captive-portal/opennds
[OpenWrt Wiki] OpenNDS Captive PortalProduct
-
https://github.com/openNDS/openNDS/blob/master/ChangeLog
openNDS/ChangeLog at master · openNDS/openNDS · GitHubRelease Notes
Jump to