Vulnerability Details CVE-2018-16598
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 51.5%
CVSS Severity
CVSS v3 Score 5.9
CVSS v2 Score 4.3
Products affected by CVE-2018-16598
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.0.0
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.1.0
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.0
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.1
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.2
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.3
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.4
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.5
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.6
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.2.7
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.3.0
-
cpe:2.3:a:amazon:amazon_web_services_freertos:1.3.1
-
cpe:2.3:a:amazon:freertos:*