CVE-2025-23019

IPv6-in-IPv4 tunneling (RFC 4213) allows an attacker to spoof and route traffic via an exposed network interface.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ietf:ipv6:-:*:*:*:*:*:*:*

History

29 Jan 2025, 18:02

Type Values Removed Values Added
CPE cpe:2.3:a:ietf:ipv6:-:*:*:*:*:*:*:*
Summary
  • (es) La tunelización IPv6 en IPv4 (RFC 4213) permite a un atacante falsificar y enrutar el tráfico a través de una interfaz de red expuesta.
References () https://datatracker.ietf.org/doc/html/rfc4213 - () https://datatracker.ietf.org/doc/html/rfc4213 - Technical Description
References () https://papers.mathyvanhoef.com/usenix2025-tunnels.pdf - () https://papers.mathyvanhoef.com/usenix2025-tunnels.pdf - Technical Description
References () https://www.top10vpn.com/research/tunneling-protocol-vulnerability/ - () https://www.top10vpn.com/research/tunneling-protocol-vulnerability/ - Technical Description
CWE NVD-CWE-Other
First Time Ietf ipv6
Ietf

14 Jan 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-14 20:15

Updated : 2025-01-29 18:02


NVD link : CVE-2025-23019

Mitre link : CVE-2025-23019

CVE.ORG link : CVE-2025-23019


JSON object : View

Products Affected

ietf

  • ipv6
CWE
CWE-940

Improper Verification of Source of a Communication Channel

NVD-CWE-Other