First published: Thu Jan 30 2025(Updated: )
Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Fuchsia |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10604 is classified as a moderate severity vulnerability due to the potential for network protocol header fields to be guessed.
To address CVE-2024-10604, users should update their Google Fuchsia installations to the latest available patch that mitigates the vulnerability.
CVE-2024-10604 affects the algorithms used for populating TCP and UDP source ports, TCP ISN, TCP timestamps, and IPv4/IPv6 fragment IDs in Google Fuchsia.
CVE-2024-10604 could allow an attacker to predict certain network parameter values, potentially leading to exploitation of network communication protocols.
Currently, there are no known workarounds for CVE-2024-10604 other than applying the security update from Google Fuchsia.