Advisory Details

June 26th, 2017

ARRIS VAP2500 list_mac_address Authentication Bypass Remote Code Execution Vulnerability

ZDI-16-696
ZDI-CAN-3873

CVE ID
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS ARRIS
AFFECTED PRODUCTS VAP2500
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the authentication validation mechanism of the used in the list_mac_address.php management portal page. The issue lies in the failure to stop processing the page after an unsuccessful attempt to validate authentication. An attacker can leverage this vulnerability to execute code under the context of root.

ADDITIONAL DETAILS


"ARRIS has taken the security vulnerabilities reported by the Zero Day Initiative for the ARRIS VAP2500 product seriously. The ARRIS VAP2500 product team worked quickly to develop a software update to resolve the reported vulnerabilities and shared the update with our service provider customers in October, 2016. As with many of the products we make, this update ultimately is delivered to the end user's equipment by their respective service provider. The reported vulnerabilities did not compromise video content or end users' personal data, but could have the potential to cause device stability problems in some unlikely circumstances."


DISCLOSURE TIMELINE
  • 2016-08-09 - Vulnerability reported to vendor
  • 2017-06-26 - Coordinated public release of advisory
CREDIT Ricky "HeadlessZeke" Lawshae
BACK TO ADVISORIES