Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
References
| Link | Resource |
|---|---|
| https://www.cloudfoundry.org/blog/cve-2023-34061-gorouter-route-pruning/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Jan 2024, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pivotal cloud Foundry Routing Release
Pivotal cloud Foundry Deployment Pivotal |
|
| References | () https://www.cloudfoundry.org/blog/cve-2023-34061-gorouter-route-pruning/ - Vendor Advisory | |
| CWE | CWE-400 | |
| CPE | cpe:2.3:a:pivotal:cloud_foundry_deployment:*:*:*:*:*:*:*:* cpe:2.3:a:pivotal:cloud_foundry_routing_release:*:*:*:*:*:*:*:* |
12 Jan 2024, 13:47
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
12 Jan 2024, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-12 07:15
Updated : 2024-01-18 20:24
NVD link : CVE-2023-34061
Mitre link : CVE-2023-34061
CVE.ORG link : CVE-2023-34061
JSON object : View
Products Affected
pivotal
- cloud_foundry_routing_release
- cloud_foundry_deployment
CWE
CWE-400
Uncontrolled Resource Consumption
