Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
History

Mon, 24 Feb 2025 12:15:00 +0000

Type Values Removed Values Added
References

Thu, 30 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 19:30:00 +0000

Type Values Removed Values Added
Description Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
Title Identifiable Header Values In Fuchsia Leading To Tracking of The User
Weaknesses CWE-330
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-02-24T12:00:19.548Z

Reserved: 2024-10-31T15:32:49.756Z

Link: CVE-2024-10604

cve-icon Vulnrichment

Updated: 2025-01-30T20:28:50.558Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-30T20:15:33.003

Modified: 2025-02-24T12:15:10.727

Link: CVE-2024-10604

cve-icon Redhat

No data.