Description
Amped Wireless R10000 devices with firmware 2.5.2.11 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-7210 | Amped Wireless R10000 devices with firmware 2.5.2.11 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value. |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T07:43:46.165Z
Reserved: 2015-09-18T00:00:00.000Z
Link: CVE-2015-7279
No data.
Status : Modified
Published: 2015-12-31T05:59:21.337
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-7279
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD