First published: Wed Sep 04 2024(Updated: )
Webmin before 2.202 and Virtualmin before 7.20.2 allow a network traffic loop via spoofed UDP packets on port 10000.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Virtualmin | <7.20.2 | |
Webmin | <2.202 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45692 has a severity level that can allow for significant service disruption through network traffic loops.
To fix CVE-2024-45692, upgrade Webmin to version 2.202 or later and Virtualmin to version 7.20.2 or later.
CVE-2024-45692 affects Webmin versions earlier than 2.202 and Virtualmin versions earlier than 7.20.2.
CVE-2024-45692 enables a denial of service attack through a network traffic loop via spoofed UDP packets.
CVE-2024-45692 specifically affects services running on port 10000, which is used by Webmin and Virtualmin.