9.1
CVE-2022-46415
- EPSS 0.33%
- Veröffentlicht 27.03.2023 21:15:10
- Zuletzt bearbeitet 19.02.2025 19:15:11
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
DJI Spark 01.00.0900 allows remote attackers to prevent legitimate terminal connections by exhausting the DHCP IP address pool. To accomplish this, the attacker would first need to connect to the device's internal Wi-Fi network (e.g., by guessing the password). Then, the attacker would need to send many DHCP request packets.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dji ≫ Spark Firmware Version01.00.0900
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.33% | 0.555 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
| cve@mitre.org | 9.1 | 3.1 | 5.3 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
|
CWE-291 Reliance on IP Address for Authentication
The product uses an IP address for authentication.