Vulnerability CVE-2014-8872


Published: 2017-08-28   Modified: 2017-08-29

Description:
Improper Verification of Cryptographic Signature in AVM FRITZ!Box 6810 LTE after firmware 5.22, FRITZ!Box 6840 LTE after firmware 5.23, and other models with firmware 5.50.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

Vendor: AVM
Product: Fritz!box 6810 lte firmware 
Product: Fritz!box 6840 lte firmware 

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://packetstormsecurity.com/files/130040/AVM-FRITZ-Box-Firmware-Signature-Bypass.html
http://seclists.org/fulldisclosure/2015/Jan/86
http://www.securityfocus.com/archive/1/534522/100/0/threaded

Related CVE
CVE-2015-7242
Cross-site scripting (XSS) vulnerability in the Push-Service-Mails feature in AVM FRITZ!OS before 6.30 allows remote attackers to inject arbitrary web script or HTML via the display name in the FROM field of an SIP INVITE message.
CVE-2014-8886
AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and consequently execute arbitrary code, via a crafted fi...
CVE-2014-9727
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.
CVE-2007-0431
AVM Fritz!Box 7050, and possibly other product models, allows remote attackers to cause a denial of service (VoIP application crash) via a zero-length UDP packet to the SIP port (port 5060).
CVE-2000-0261
The AVM KEN! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
CVE-2000-0262
The AVM KEN! ISDN Proxy server allows remote attackers to cause a denial of service via a malformed request.

Copyright 2019, cxsecurity.com

 

Back to Top