We have identified a vulnerability in one of the Spectroserver. VA name is "ICMP Based TCP Reset Denial of Service Vulnerability":
Vulnerability Name | CVE-ID | QID | Port Number | Component | Threat | Impact |
ICMP Based TCP Reset Denial of Service Vulnerability | 82058 | Spectroserver | The target host is vulnerable to a denial of service condition. The TCP stack present on the host allows an ICMP hard-error packet to reset an established TCP connection that the packet identifies. An example ICMP hard error (defined in the IETF RFCs) is the ICMP message "fragmentation required, but Do-Not-Fragment bit is set". | Since ICMP packets can be spoofed, attackers can exploit this issue by guessing the IP address and port numbers of a TCP connection established on the host, and then resetting these connections simply by sending an ICMP hard-error packet. |
Spectrum 20.x
Spectrum does not use any ICMP Source Quench messages for device communications. So, therefore it is not impacted by the vulnerabilities CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060.