Vulnerabilites related to Tempesta - Tempesta FW
cve-2024-2758
Vulnerability from cvelistv5
Published
2024-04-03 17:17
Modified
2025-02-13 17:46
Severity ?
EPSS score ?
Summary
Tempesta FW rate limits are not enabled by default. They are either set too large to capture empty CONTINUATION frames attacks or too small to handle normal HTTP requests appropriately.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Tempesta | Tempesta FW |
Version: 0.7.0 < |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-2758", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-03T18:54:02.766108Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-30T18:29:52.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:25:41.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/tempesta-tech/tempesta/security/advisories/GHSA-3xwj-5ch3-q9p4" }, { "tags": [ "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/421644" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/04/03/16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Tempesta FW", "vendor": "Tempesta", "versions": [ { "lessThanOrEqual": "0.7.0", "status": "affected", "version": "0.7.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Tempesta FW rate limits are not enabled by default. They are either set too large to capture empty CONTINUATION frames attacks or too small to handle normal HTTP requests appropriately." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-1188: Initialization of a Resource with an Insecure Default", "lang": "en" } ] }, { "descriptions": [ { "description": "CWE-204: Inadequate Information Flow Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T18:12:13.569Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "url": "https://github.com/tempesta-tech/tempesta/security/advisories/GHSA-3xwj-5ch3-q9p4" }, { "url": "https://www.kb.cert.org/vuls/id/421644" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/03/16" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2024-2758", "x_generator": { "engine": "VINCE 2.1.12", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2024-2758" } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2024-2758", "datePublished": "2024-04-03T17:17:56.307Z", "dateReserved": "2024-03-21T12:31:11.759Z", "dateUpdated": "2025-02-13T17:46:31.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }