search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Verizon Fios Actiontec model MI424WR-GEN3I router vulnerable to cross-site request forgery

Vulnerability Note VU#278204

Original Release Date: 2013-03-18 | Last Revised: 2013-12-05

Overview

The Verizon FIOS Actiontec router model MI424WR-GEN3I is susceptible to cross-site request forgery attacks. (CWE-352)

Description

The Verizon FIOS Actiontec router model MI424WR-GEN3I is susceptible to cross-site request forgery attacks. (CWE-352) A remote attacker that is able to trick a user into clicking a malicious link while logged into the router may be able to compromise the router.

Impact

A remote unauthenticated attacker that is able to trick a user into clicking a malicious link while they are logged into the router may be able to compromise the router.

Solution

We are currently unaware of a practical solution to this problem. Please consider the following workarounds.

Restrict Access

Verify the router's web interface is not Internet accessible. As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the router web interface using stolen credentials from a blocked network location.

Do Not Stay Logged Into the Router's Management Interface

Always log out of the router's management interface when done using it.

Vendor Information

278204
 

Verizon Affected

Notified:  February 01, 2013 Updated: March 18, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.5 E:POC/RL:W/RC:UR
Environmental 4.2 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Jacob Holcomb of Independent Security Evaluators for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2013-0126
Date Public: 2013-03-18
Date First Published: 2013-03-18
Date Last Updated: 2013-12-05 21:34 UTC
Document Revision: 21

Sponsored by CISA.