The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Link | Tags |
---|---|
https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ | third party advisory mitigation |
https://www.kb.cert.org/vuls/id/608209 | third party advisory us government resource |