Affected products do not properly enforce TCP sequence number validation in specific scenarios but accept values within a broad range. This could allow an unauthenticated remote attacker e.g. to interfere with connection setup, potentially leading to a denial of service. The attack succeeds only if an attacker can inject IP packets with spoofed addresses at precisely timed moments, and it affects only TCP-based services.
References
Configurations
No configuration.
History
09 Dec 2025, 16:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 16:17
Updated : 2025-12-09 18:36
NVD link : CVE-2025-40820
Mitre link : CVE-2025-40820
CVE.ORG link : CVE-2025-40820
JSON object : View
Products Affected
No product.
CWE
CWE-940
Improper Verification of Source of a Communication Channel
