CVE ID | CVE-2014-8508 |
CVSS SCORE | 6.4, AV:N/AC:L/Au:N/C:P/I:P/A:N |
AFFECTED VENDORS |
Denon |
AFFECTED PRODUCTS |
AVR-3313CI |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['16530']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
The specific flaw exists within parameters used by s_network.asp which does not properly sanitize user-supplied data. Some parameter values are used on multiple pages and the injected JavaScript will therefore run when any user views any of those pages, including the portal's landing page.
|
ADDITIONAL DETAILS |
08/13/2014 - ZDI contacted Denon's Live Support Chat requested a PGP and secure email, but was ultimately disconnected -- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines and disable the feature when the receiver is not in use. It can be turned off when in standby mode by following these instructions: Press MAIN to switch the zone to the MAIN ZONE. Press SETUP. Select 'IP Control'. Change setting to 'Off in Standby'
|
DISCLOSURE TIMELINE |
|
CREDIT | Ricky "HeadlessZeke" Lawshae of HP DVLabs |