Vulnerability Description
The Kerlink firewall in ChirpStack chirpstack-mqtt-forwarder before 4.2.1 and chirpstack-gateway-bridge before 4.0.11 wrongly accepts certain TCP packets when a connection is not in the ESTABLISHED state.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chirpstack | Gateway Bridge | < 4.0.11 |
| Chirpstack | Mqtt Forwarder | < 4.2.1 |
References
- https://github.com/chirpstack/chirpstack-gateway-bridge/commit/0c1e80c9fa9f5d093Patch
- https://github.com/chirpstack/chirpstack-mqtt-forwarder/commit/4fa9e6eaaec8c3ca4Patch
- https://github.com/chirpstack/chirpstack-gateway-bridge/commit/0c1e80c9fa9f5d093Patch
- https://github.com/chirpstack/chirpstack-mqtt-forwarder/commit/4fa9e6eaaec8c3ca4Patch
FAQ
What is CVE-2024-29862?
CVE-2024-29862 is a vulnerability with a CVSS score of 7.5 (HIGH). The Kerlink firewall in ChirpStack chirpstack-mqtt-forwarder before 4.2.1 and chirpstack-gateway-bridge before 4.0.11 wrongly accepts certain TCP packets when a connection is not in the ESTABLISHED st...
How severe is CVE-2024-29862?
CVE-2024-29862 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-29862?
Check the references section above for vendor advisories and patch information. Affected products include: Chirpstack Gateway Bridge, Chirpstack Mqtt Forwarder.