20.06.2015 Views

ISE SOHO Vulnerability Catalog Published - Independent Security ...

ISE SOHO Vulnerability Catalog Published - Independent Security ...

ISE SOHO Vulnerability Catalog Published - Independent Security ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Netgear WNDR4700 <br />

<strong>Vulnerability</strong>: Authentication Bypass <br />

CVE: CVE-2013-3071<br />

Description<br />

The Netgear WNDR4700 router is susceptible to an authentication bypass vulnerability<br />

that permanently breaks the web servers HTTP Basic Authentication until the router is<br />

restored to factory default settings.<br />

Attack Requirements<br />

♦ The attacker must have the ability to send a HTTP request to the routers web<br />

management application.<br />

♦ Authentication is not required for an attacker to exploit this vulnerability.<br />

Details<br />

♦ Other firmware versions may be vulnerable.<br />

Impact<br />

If an attacker has the ability to send HTTP requests to the routers web server, they can<br />

effectively bypass router authentication and assume full administrative control over the<br />

system.<br />

Recommendations to the Vendor<br />

♦ Once a user has completed the initial router setup wizard, prohibit access to the<br />

setup pages.<br />

♦ Additional information for vendors regarding immediate and long term fixes for<br />

these issues can be found here: http://www.securityevaluators.com/content/casestudies/routers/#recommendationsVendors<br />

Solution<br />

♦ There currently is not a solution to this problem.<br />

♦ Restrict access to WAN services such as remote management to prevent an<br />

attacker from gaining access if an attack is successful.<br />

Proof of Concept Exploit<br />

Attackers can make the following request the router routers web server to bypass its<br />

authentication.<br />

<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!