Multiple vulnerabilities in DMG MORI Digital Cente middleware



Published: 2024-04-05
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2024-23911
CVE-2024-28894
CVE-2024-28957
CWE-ID CWE-125
CWE-340
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cente IPv6
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cente IPv6 SNMPv2
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cente IPv6 SNMPv3
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cente TCP/IPv4
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cente TCP/IPv4 SNMPv2
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cente TCP/IPv4 SNMPv3
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor DMG MORI Digital

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU88171

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-23911

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the IPv6 NDP packets. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cente IPv6: 1.51

Cente IPv6 SNMPv2: 2.30

Cente IPv6 SNMPv3: 2.30

External links

http://jvn.jp/en/vu/JVNVU94016877/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU88174

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-28894

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the IPv6 headers. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cente IPv6: 1.51

Cente IPv6 SNMPv2: 2.30

Cente IPv6 SNMPv3: 2.30

External links

http://jvn.jp/en/vu/JVNVU94016877/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Generation of Predictable Numbers or Identifiers

EUVDB-ID: #VU88179

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-28957

CWE-ID: CWE-340 - Generation of Predictable Numbers or Identifiers

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to generation of predictable numbers or identifiers. A remote attacker can predict some packet header IDs of the device and interfere communications.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cente TCP/IPv4: 1.41

Cente TCP/IPv4 SNMPv2: 2.30

Cente TCP/IPv4 SNMPv3: 2.30

Cente IPv6: 1.51

Cente IPv6 SNMPv2: 2.30

Cente IPv6 SNMPv3: 2.30

External links

http://jvn.jp/en/vu/JVNVU94016877/index.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###