Unrated severityNVD Advisory· Published Sep 21, 2015· Updated May 6, 2026
CVE-2015-7296
CVE-2015-7296
Description
Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M use a linear algorithm for selecting the ID value in the header of a DNS query performed on behalf of the device itself, which makes it easier for remote attackers to spoof responses by including this ID value, as demonstrated by a response containing the address of the firmware update server, a different vulnerability than CVE-2015-2914.
Affected products
2- cpe:2.3:o:securifi:almond_firmware:*:*:*:*:*:*:*:*Range: <=al1-r201exp10-l304-w33
- cpe:2.3:o:securifi:almond-2015_firmware:*:*:*:*:*:*:*:*Range: <=al2-r088
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.kb.cert.org/vuls/id/906576nvdPatchThird Party AdvisoryUS Government Resource
News mentions
0No linked articles in our index yet.