Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:2WIRE-DSL-VULN

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Release Date

2008/04/09

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

MISC: 2Wire DSL Router Vulnerability


This signature detects attempts to exploit a known vulnerability in 2Wire DSL routers. An attacker can create a malicious Web site containing dangerous hyperlinks, which if accessed by a victim, allows the attacker to gain control of the victim's DSL router.

Extended Description

Multiple 2Wire routers are prone to an access-validation vulnerability because they fail to adequately authenticate users before performing certain actions. Unauthenticated attackers can leverage this issue to change the password of arbitrary user accounts on the router. Successful attacks will completely compromise affected devices. 2Wire routers that have the 'H04_POST' page are affected by this issue. UPDATE: This BID has been retired because it has been found to be a duplicate of BID 27246 (2Wire Routers Cross-Site Request Forgery Vulnerability). UPDATE (February 1, 2008): This BID is being reinstated. Further investigation and new information reveal that this vulnerability differs from the one described in BID 27246.

Affected Products

  • 2Wire 1701HG 3.17.5
  • 2Wire 1701HG 3.7.1
  • 2Wire 1701HG 5.29.51
  • 2Wire 1800HW 3.17.5
  • 2Wire 1800HW 3.7.1
  • 2Wire 1800HW 5.29.51
  • 2Wire 2071 Gateway 3.17.5
  • 2Wire 2071 Gateway 3.7.1
  • 2Wire 2071 Gateway 5.29.51
  • 2Wire 3800 HGV-B 5.29.105
  • 2Wire 3800 HGV-B 5.29.33

References

  • BugTraq: 27516

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out