Check Point Advisories

Tenda Multiple Products Stack Overflow (CVE-2022-32039; CVE-2022-32043; CVE-2023-37714; CVE-2023-37715; CVE-2023-37716; CVE-2023-37717; CVE-2023-37718; CVE-2023-37719; CVE-2023-37721; CVE-2023-37722; CVE-2023-37723; CVE-2023-51093)

Check Point Reference: CPAI-2023-1623
Date Published: 2 Apr 2024
Severity: Critical
Last Updated: Sunday 21 April, 2024
Source:
Industry Reference:CVE-2022-32039
CVE-2022-32043
CVE-2023-37714
CVE-2023-37715
CVE-2023-37716
CVE-2023-37717
CVE-2023-37718
CVE-2023-37719
CVE-2023-37721
CVE-2023-37722
CVE-2023-37723
CVE-2023-51093
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable? Tenda F1202 V1.0BR_V1.2.0.20(408)
Tenda FH1202_V1.2.0.19_EN
Tenda AC10 V1.0
Tenda AC1206 V1.0
Tenda AC7 V1.0
Tenda AC5 V1.0
Tenda AC9 V3.0
Tenda 4G300
Tenda PW20154A
Tenda PA202
Tenda M3 V1.0.0.12
Tenda M3 V1.0.0.12(4856)
Vulnerability Description A stack overflow vulnerability exists in multiple Tenda products. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system or cause application crashes.

Protection Overview

This protection detects attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R81 / R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Tenda Multiple Products Stack Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Application Servers Protection Violation.
Attack Information:  Tenda Multiple Products Stack Overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK