Vulnerability CVE-2015-0932


Published: 2015-04-04   Modified: 2015-04-05

Description:
The ANTlabs InnGate firmware on IG 3100, IG 3101, InnGate 3.00 E, InnGate 3.01 E, InnGate 3.02 E, InnGate 3.10 E, InnGate 3.01 G, and InnGate 3.10 G devices does not require authentication for rsync sessions, which allows remote attackers to read or write to arbitrary files via TCP traffic on port 873.

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Antlabs -> Inngate 
Antlabs -> Inngate ig 3.00 e 
Antlabs -> Inngate ig 3.01 e 
Antlabs -> Inngate ig 3.02 e 
Antlabs -> Inngate ig 3.10 e 
Antlabs -> Inngate ig 3.10 g 
Antlabs -> Inngate ig 3100 
Antlabs -> Inngate ig 3101 

 References:
http://www.kb.cert.org/vuls/id/930956
http://www.antlabs.com/index.php?option=com_content&view=article&id=195:rsync-remote-file-system-access-vulnerability-cve-2015-0932&catid=54:advisories&Itemid=133
http://www.wired.com/2015/03/big-vulnerability-hotel-wi-fi-router-puts-guests-risk/
http://blog.cylance.com/spear-team-cve-2015-0932

Copyright 2024, cxsecurity.com

 

Back to Top