Check Point Reference: | CPAI-2023-1623 |
Date Published: | 2 Apr 2024 |
Severity: | Critical |
Last Updated: | Sunday 28 July, 2024 |
Source: | |
Industry Reference: | CVE-2022-32039 CVE-2022-32040 CVE-2022-32043 CVE-2023-37710 CVE-2023-37714 CVE-2023-37715 CVE-2023-37716 CVE-2023-37717 CVE-2023-37718 CVE-2023-37719 CVE-2023-37721 CVE-2023-37722 CVE-2023-37723 CVE-2023-51093 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Tenda F1202 V1.0BR_V1.2.0.20(408) Tenda FH1202_V1.2.0.19_EN Tenda AC10 V1.0 Tenda AC1206 V1.0 Tenda AC7 V1.0 Tenda AC5 V1.0 Tenda AC9 V3.0 Tenda 4G300 Tenda PW20154A Tenda PA202 Tenda M3 V1.0.0.12 Tenda M3 V1.0.0.12(4856) Tenda AC1206 V15.03.06.23 Tenda AC10 V15.03.06.47 Tenda F1202 V1.2.0.20(408) Tenda FH1202 V1.2.0.20(408) |
Vulnerability Description | A stack overflow vulnerability exists in multiple Tenda products. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system or cause application crashes. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: Tenda Multiple Products Stack Overflow