Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32906 | Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances |
Tue, 29 Jul 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 24 Feb 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 30 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Jan 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances | |
| Title | Identifiable Header Values In Fuchsia Leading To Tracking of The User | |
| Weaknesses | CWE-330 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-24T12:00:19.548Z
Reserved: 2024-10-31T15:32:49.756Z
Link: CVE-2024-10604
Updated: 2025-01-30T20:28:50.558Z
Status : Analyzed
Published: 2025-01-30T20:15:33.003
Modified: 2025-07-29T18:44:06.057
Link: CVE-2024-10604
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:31:26Z
EUVD