Actiontec GE244000-01 Default Credentials improper authentication
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.6 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, has been found in Actiontec GE244000-01. This affects an unknown part of the component Default Credentials. This manipulation causes improper authentication. There is no exploit available. It is best practice to apply the suggested workaround.
Details
A vulnerability has been found in Actiontec GE244000-01 (affected version unknown) and classified as very critical. Affected by this vulnerability is an unknown functionality of the component Default Credentials. The manipulation with an unknown input leads to a improper authentication vulnerability. The CWE definition for the vulnerability is CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was shared 04/27/2012 as Default Passwords as not defined posting (Website). It is possible to read the advisory at cirt.net. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 03/25/2019).
The best possible mitigation is suggested to be Workaround. After successfull configuration, set the administrator password.
The vulnerability is also documented in the vulnerability database at OSVDB (100238†). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.6
VulDB Base Score: 9.8
VulDB Temp Score: 9.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Improper authenticationCWE: CWE-287
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: WorkaroundStatus: 🔍
0-Day Time: 🔍
Timeline
04/27/2012 🔍11/28/2013 🔍
03/25/2019 🔍
Sources
Advisory: Default PasswordsStatus: Not defined
GCVE (VulDB): GCVE-100-11299
OSVDB: 100238
Entry
Created: 11/28/2013 10:34Updated: 03/25/2019 15:11
Changes: 11/28/2013 10:34 (42), 03/25/2019 15:11 (1)
Complete: 🔍
Committer: olku
Cache ID: 216:958:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.