The Mirai botnet through 2024-08-19 mishandles simultaneous TCP connections to the CNC (command and control) server. Unauthenticated sessions remain open, causing resource consumption. For example, an attacker can send a recognized username (such as root), or can send arbitrary data.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mirai
Mirai botnet |
|
Weaknesses | CWE-400 | |
CPEs | cpe:2.3:a:mirai:botnet:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mirai
Mirai botnet |
|
Metrics |
cvssV3_1
|
Thu, 22 Aug 2024 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Mirai botnet through 2024-08-19 mishandles simultaneous TCP connections to the CNC (command and control) server. Unauthenticated sessions remain open, causing resource consumption. For example, an attacker can send a recognized username (such as root), or can send arbitrary data. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-22T00:00:00
Updated: 2024-08-22T14:25:59.452Z
Reserved: 2024-08-22T00:00:00
Link: CVE-2024-45163
Vulnrichment
Updated: 2024-08-22T14:25:54.552Z
NVD
Status : Awaiting Analysis
Published: 2024-08-22T04:15:20.247
Modified: 2024-08-22T15:35:12.750
Link: CVE-2024-45163
Redhat
No data.