ISE SOHO Vulnerability Catalog Published - Independent Security ...
ISE SOHO Vulnerability Catalog Published - Independent Security ...
ISE SOHO Vulnerability Catalog Published - Independent Security ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Netgear WNDR4700 <br />
<strong>Vulnerability</strong>: Authentication Bypass <br />
CVE: CVE-2013-3071<br />
Description<br />
The Netgear WNDR4700 router is susceptible to an authentication bypass vulnerability<br />
that permanently breaks the web servers HTTP Basic Authentication until the router is<br />
restored to factory default settings.<br />
Attack Requirements<br />
♦ The attacker must have the ability to send a HTTP request to the routers web<br />
management application.<br />
♦ Authentication is not required for an attacker to exploit this vulnerability.<br />
Details<br />
♦ Other firmware versions may be vulnerable.<br />
Impact<br />
If an attacker has the ability to send HTTP requests to the routers web server, they can<br />
effectively bypass router authentication and assume full administrative control over the<br />
system.<br />
Recommendations to the Vendor<br />
♦ Once a user has completed the initial router setup wizard, prohibit access to the<br />
setup pages.<br />
♦ Additional information for vendors regarding immediate and long term fixes for<br />
these issues can be found here: http://www.securityevaluators.com/content/casestudies/routers/#recommendationsVendors<br />
Solution<br />
♦ There currently is not a solution to this problem.<br />
♦ Restrict access to WAN services such as remote management to prevent an<br />
attacker from gaining access if an attack is successful.<br />
Proof of Concept Exploit<br />
Attackers can make the following request the router routers web server to bypass its<br />
authentication.<br />
<br />
31