First published: Mon Jun 19 2023(Updated: )
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not check the transport layer length in a frame before performing port filtering.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PicoTCP | <=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35846 is classified as a medium severity vulnerability due to its potential impact on network communications.
To address CVE-2023-35846, update PicoTCP to version 2.2 or later, where the issue has been resolved.
CVE-2023-35846 is caused by the failure of PicoTCP to validate the transport layer length in frames before applying port filtering.
PicoTCP versions through 2.1 are affected by CVE-2023-35846.
Yes, CVE-2023-35846 can be exploited under certain conditions, potentially allowing attackers to bypass port filtering.