Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
References
Link | Resource |
---|---|
https://fuchsia.googlesource.com/fuchsia/+/40e7fbcdcd013441daf4492f1ead349a9e5b80dc | Patch |
https://fuchsia.googlesource.com/fuchsia/+/a3c17a4d6b3140f9175d6cf6ac4eb4e775f8dea8 | Patch |
https://www.ndss-symposium.org/wp-content/uploads/2025-122-paper.pdf | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Jul 2025, 18:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://fuchsia.googlesource.com/fuchsia/+/40e7fbcdcd013441daf4492f1ead349a9e5b80dc - Patch | |
References | () https://fuchsia.googlesource.com/fuchsia/+/a3c17a4d6b3140f9175d6cf6ac4eb4e775f8dea8 - Patch | |
References | () https://www.ndss-symposium.org/wp-content/uploads/2025-122-paper.pdf - Exploit, Mitigation, Third Party Advisory | |
First Time |
Google
Google fuchsia |
|
CPE | cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
24 Feb 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
30 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-30 20:15
Updated : 2025-07-29 18:44
NVD link : CVE-2024-10604
Mitre link : CVE-2024-10604
CVE.ORG link : CVE-2024-10604
JSON object : View
Products Affected
- fuchsia
CWE
CWE-330
Use of Insufficiently Random Values