Advisory Details

November 25th, 2014

ARRIS VAP2500 Management Portal Authentication Bypass Vulnerability

ZDI-14-388
ZDI-CAN-2136

CVE ID CVE-2014-8424
CVSS SCORE 7.8, AV:N/AC:L/Au:N/C:C/I:N/A:N
AFFECTED VENDORS ARRIS
AFFECTED PRODUCTS VAP2500
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13562']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of user authentication. The issue lies in the failure to compare the password when authenticating. An attacker can leverage this vulnerability to bypass authentication checks which can then be chained to execute code with root privileges.

ADDITIONAL DETAILS


Vendor has released a hotfix to address the issue: FW08.41


DISCLOSURE TIMELINE
  • 2014-04-29 - Vulnerability reported to vendor
  • 2014-11-25 - Coordinated public release of advisory
CREDIT Ricky "HeadlessZeke" Lawshae
BACK TO ADVISORIES