Overview
Linksys EA series routers running the Linksys SMART WiFi firmware contain multiple vulnerabilities.
Description
CWE-320: Key Management Errors - CVE-2014-8243 An remote, unauthenticated attacker can read the router's .htpassword file by requesting http(s)://<router_ip>/.htpasswd. The .htpasswd file contains the MD5 hash of the administrator password. |
Impact
A remote, unauthenticated attacker may be able to read or modify sensitive information on the router. |
Solution
Apply an Update: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Temporal | 5.3 | E:POC/RL:OF/RC:C |
Environmental | 5.3 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- http://support.linksys.com/en-us/support/routers/E4200
- http://support.linksys.com/en-us/support/routers/EA4500
- http://support.linksys.com/en-us/support/routers/EA6200
- http://support.linksys.com/en-us/support/routers/EA6300
- http://support.linksys.com/en-us/support/routers/EA6400
- http://support.linksys.com/en-us/support/routers/EA6500
- http://support.linksys.com/en-us/support/routers/EA6700
- http://support.linksys.com/en-us/support/routers/EA6900
- http://cwe.mitre.org/data/definitions/310.html
- http://cwe.mitre.org/data/definitions/200.html
Acknowledgements
Thanks to Kyle Lovett and Sijmen Ruwhof for discovering these vulnerabilities.
This document was written by Todd Lewellen.
Other Information
CVE IDs: | CVE-2014-8243, CVE-2014-8244 |
Date Public: | 2014-10-31 |
Date First Published: | 2014-10-31 |
Date Last Updated: | 2014-11-07 19:15 UTC |
Document Revision: | 39 |