Ietf Ietf

Do you want an email whenever new security vulnerabilities are reported in any Ietf product?

Products by Ietf Sorted by Most Security Vulnerabilities since 2018

Ietf P802 1q4 vulnerabilities

Ietf Http1 vulnerability

Known Exploited Ietf Vulnerabilities

The following Ietf vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Service Location Protocol (SLP) Denial-of-Service Vulnerability The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor. CVE-2023-29552 November 8, 2023
HTTP/2 Rapid Reset Attack Vulnerability HTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS). CVE-2023-44487 October 10, 2023

By the Year

In 2024 there have been 0 vulnerabilities in Ietf . Last year Ietf had 1 security vulnerability published. Right now, Ietf is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 7.50
2022 4 4.70
2021 1 5.90
2020 0 0.00
2019 0 0.00
2018 1 5.90

It may take a day or so for new Ietf vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Ietf Security Vulnerabilities

The HTTP/2 protocol

CVE-2023-44487 7.5 - High - October 10, 2023

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Resource Exhaustion

Layer 2 network filtering capabilities such as IPv6 RA guard

CVE-2021-27862 4.7 - Medium - September 27, 2022

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).

Authentication Bypass by Spoofing

Layer 2 network filtering capabilities such as IPv6 RA guard

CVE-2021-27861 4.7 - Medium - September 27, 2022

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)

Authentication Bypass by Spoofing

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames

CVE-2021-27854 4.7 - Medium - September 27, 2022

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.

Authentication Bypass by Spoofing

Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection

CVE-2021-27853 4.7 - Medium - September 27, 2022

Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.

Authentication Bypass by Spoofing

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26

CVE-2020-20950 5.9 - Medium - January 19, 2021

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.

Use of a Broken or Risky Cryptographic Algorithm

The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks

CVE-2018-5389 5.9 - Medium - September 06, 2018

The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network.

Weak Password Requirements

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.