Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 04 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:wds:*:*:*:*:*:*:*:* cpe:2.3:a:mikrotik:routeros_tftp:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dproxy-nexgen Project
Dproxy-nexgen Project dproxy-nexgen Microsoft Microsoft wds Mikrotik Mikrotik routeros Tftp |
|
| References |
| |
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-04T12:04:51.230Z
Reserved: 2024-03-04T16:29:42.695Z
Link: CVE-2024-2169
Updated: 2024-09-04T12:04:51.230Z
Status : Deferred
Published: 2024-03-19T20:15:07.320
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-2169
OpenCVE Enrichment
No data.
Weaknesses
No weakness.