Uncontrolled resource consumption vulnerability in IDF v0.10.0-0C03-03 and ZLF v0.10.0-0C03-04. The devices improperly handle TLS requests associated with PROCOME sockets, so TLS requests sent to those PROCOME ports could cause the device to reboot and result in a denial of service. To exploit this vulnerability, PROCOME ports must be configured and active, with communications encryption active.
History

Fri, 06 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Jun 2025 12:00:00 +0000

Type Values Removed Values Added
Description Uncontrolled resource consumption vulnerability in IDF v0.10.0-0C03-03 and ZLF v0.10.0-0C03-04. The devices improperly handle TLS requests associated with PROCOME sockets, so TLS requests sent to those PROCOME ports could cause the device to reboot and result in a denial of service. To exploit this vulnerability, PROCOME ports must be configured and active, with communications encryption active.
Title Uncontrolled resource consumption vulnerability in IDF and ZLF
Weaknesses CWE-400
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2025-06-06T11:53:10.953Z

Updated: 2025-06-06T12:34:51.168Z

Reserved: 2025-04-16T09:57:04.871Z

Link: CVE-2025-41361

cve-icon Vulnrichment

Updated: 2025-06-06T12:34:42.547Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-06T12:15:22.220

Modified: 2025-06-06T14:06:58.193

Link: CVE-2025-41361

cve-icon Redhat

No data.