Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a feature that could enable attackers to invalidate a legitimate users session and cause a denial-of-service attack on a users account.
The product releases a resource that is still intended to be used by itself or another actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Reyee_os | Ruijienetworks | 2.206.0 (including) | 2.320.0 (excluding) |
This weakness focuses on errors in which the product should not release a resource, but performs the release anyway. This is different than a weakness in which the product releases a resource at the appropriate time, but it maintains a reference to the resource, which it later accesses. For this weakness, the resource should still be valid upon the subsequent access. When a product releases a resource that is still being used, it is possible that operations will still be taken on this resource, which may have been repurposed in the meantime, leading to issues similar to CWE-825. Consequences may include denial of service, information exposure, or code execution.