Vulnerabilities > Ietf

DATE CVE VULNERABILITY TITLE RISK
2025-02-05 CVE-2024-7595 Unspecified vulnerability in Ietf products
GRE and GRE6 Protocols (RFC2784) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.
network
high complexity
ietf
6.5
2025-02-05 CVE-2024-7596 Unspecified vulnerability in Ietf Generic UDP Encapsulation
Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors. This can be considered similar to CVE-2020-10136.
network
high complexity
ietf
6.5
2025-01-14 CVE-2025-23018 Unspecified vulnerability in Ietf Ipv6
IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface.
network
high complexity
ietf
6.5
2025-01-14 CVE-2025-23019 Unspecified vulnerability in Ietf Ipv6
IPv6-in-IPv4 tunneling (RFC 4213) allows an attacker to spoof and route traffic via an exposed network interface.
network
high complexity
ietf
6.5
2023-10-10 CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. 7.5
2022-09-27 CVE-2021-27854 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
low complexity
ieee ietf CWE-290
4.7
2022-09-27 CVE-2021-27861 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)
low complexity
ieee ietf CWE-290
4.7
2022-09-27 CVE-2021-27862 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).
low complexity
ieee ietf CWE-290
4.7
2022-09-27 CVE-2021-27853 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.
low complexity
ieee ietf cisco CWE-290
4.7
2021-01-20 CVE-2020-20949 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924).
network
high complexity
st ietf CWE-327
5.9