4.3
CVSSv2

CVE-2018-16598

Published: 06/12/2018 Updated: 04/01/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in Amazon Web Services (AWS) FreeRTOS up to and including 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

amazon amazon web services freertos

amazon freertos

Github Repositories

Vulnerability Link for React.js

react-vulnlink Link creator using standard vulnerability identifiers Install npm install --save react-vulnlink Usage import React, { Component } from 'react' import VulnLink from 'react-vulnlink' class Example extends Component { render () { return ( <VulnLink id="CVE-2018-16598" /&