search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple broadband routers use vulnerable versions of Allegro RomPager

Vulnerability Note VU#561444

Original Release Date: 2014-12-19 | Last Revised: 2017-05-09

Overview

Multiple broadband routers use vulnerable versions of Allegro RomPager in current firmware releases.

Description

Many home and office/home office (SOHO) routers have been found to be using vulnerable versions of the Allegro RomPager embedded web server. Allegro RomPager versions prior to 4.34 contain a vulnerability in cookie processing code that can be leveraged to grant attackers administrative privileges on the device. According to Check Point's advisory, the vulnerability was addressed by Allegro in 2005 but is present in current or recent firmware releases of many devices.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code on the device.

Solution

Apply an update

Check vendor websites for a firmware update that addresses this issue and apply it if available.

Use third-party firmware

Technical users may consider flashing to third-party firmware such as that provided by dd-wrt, openwrt, or others. Note that this action may invalidate device warranties.

Disable WAN services

If possible, disable services that listen for HTTP or HTTPS connections on the device's WAN side.

Vendor Information

Check Point Software Technologies has published a list of devices (PDF) suspected of being vulnerable. We will update the Vendor Information section below as more information becomes available.

561444
 

CVSS Metrics

Group Score Vector
Base 10 AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal 8.5 E:POC/RL:W/RC:C
Environmental 6.4 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Shahar Tal of Check Point Software Technologies for reporting this vulnerability.

This document was written by Joel Land.

Other Information

CVE IDs: CVE-2014-9222
Date Public: 2014-12-19
Date First Published: 2014-12-19
Date Last Updated: 2017-05-09 13:32 UTC
Document Revision: 27

Sponsored by CISA.