CVE-2023-38321

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-38321
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38321.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-38321
Related
Published
2023-12-25T09:15:07Z
Modified
2024-09-18T03:24:06.184601Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.

References

Affected packages

Debian:12 / opennds

Package

Name
opennds
Purl
pkg:deb/debian/opennds?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.10.0-1

10.*

10.2.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}