Vulnerability Details : CVE-2023-5324
A vulnerability has been found in eeroOS up to 6.16.4-11 and classified as critical. This vulnerability affects unknown code of the component Ethernet Interface. The manipulation leads to denial of service. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241024.
Vulnerability category: Denial of service
Products affected by CVE-2023-5324
- cpe:2.3:o:eero:eeroos:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-5324
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-5324
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:N/I:N/A:P |
6.5
|
2.9
|
VulDB | |
4.3
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
2.8
|
1.4
|
VulDB | |
4.3
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
2.8
|
1.4
|
VulDB | 2024-02-29 |
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2023-5324
-
The product does not release or incorrectly releases a resource before it is made available for re-use.Assigned by: cna@vuldb.com (Primary)
References for CVE-2023-5324
-
https://vuldb.com/?id.241024
CVE-2023-5324: eeroOS Ethernet Interface denial of serviceThird Party Advisory
-
https://github.com/nomis/eero-zero-length-ipv6-options-header-dos
GitHub - nomis/eero-zero-length-ipv6-options-header-dos: eeroOS Ethernet Interface Denial of Service Vulnerability (CVE-2023-5324)Third Party Advisory
-
https://vuldb.com/?ctiid.241024
Login requiredPermissions Required;Third Party Advisory
Jump to