CVE-2024-10604

Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*
cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*

History

29 Jul 2025, 18:44

Type Values Removed Values Added
First Time Google
Google fuchsia
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CPE cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*
References () https://fuchsia.googlesource.com/fuchsia/+/40e7fbcdcd013441daf4492f1ead349a9e5b80dc - () https://fuchsia.googlesource.com/fuchsia/+/40e7fbcdcd013441daf4492f1ead349a9e5b80dc - Patch
References () https://fuchsia.googlesource.com/fuchsia/+/a3c17a4d6b3140f9175d6cf6ac4eb4e775f8dea8 - () https://fuchsia.googlesource.com/fuchsia/+/a3c17a4d6b3140f9175d6cf6ac4eb4e775f8dea8 - Patch
References () https://www.ndss-symposium.org/wp-content/uploads/2025-122-paper.pdf - () https://www.ndss-symposium.org/wp-content/uploads/2025-122-paper.pdf - Exploit, Mitigation, Third Party Advisory

24 Feb 2025, 12:15

Type Values Removed Values Added
Summary
  • (es) Las vulnerabilidades en los algoritmos utilizados por Fuchsia para completar los campos de encabezado del protocolo de red, específicamente TCP ISN, TCP timestamp, puertos de origen TCP y UDP y el ID de fragmento IPv4/IPv6 permiten adivinar estos valores en determinadas circunstancias.
References
  • () https://www.ndss-symposium.org/wp-content/uploads/2025-122-paper.pdf -

30 Jan 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-30 20:15

Updated : 2025-07-29 18:44


NVD link : CVE-2024-10604

Mitre link : CVE-2024-10604

CVE.ORG link : CVE-2024-10604


JSON object : View

Products Affected

google

  • fuchsia
CWE
CWE-330

Use of Insufficiently Random Values