ID CVE-2008-1527
Summary ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), support authentication over HTTP via a hash string in the hiddenPassword field, which allows remote attackers to obtain access via a replay attack.
References
Vulnerable Configurations
  • cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*
    cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*
    cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*
    cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-10-2018 - 20:35)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bugtraq 20080301 The Router Hacking Challenge is Over!
misc
Last major update 11-10-2018 - 20:35
Published 26-03-2008 - 10:44
Last modified 11-10-2018 - 20:35
Back to Top