| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.4 | $0-$5k | 0.00 |
Summary
A vulnerability was found in 3com OfficeConnect Remote 812 ADSL Router and classified as critical. Impacted is an unknown function. Executing a manipulation can lead to security check. This vulnerability is handled as CVE-2004-0477. The attack can be executed remotely. There is not any exploit available. The application of restrictive firewalling is recommended.
Details
A vulnerability classified as critical was found in 3com OfficeConnect Remote 812 ADSL Router (Router Operating System) (the affected version is unknown). This vulnerability affects an unknown code. The manipulation with an unknown input leads to a security check vulnerability. The CWE definition for the vulnerability is CWE-358. The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique. As an impact it is known to affect confidentiality, and integrity. CVE summarizes:
Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote attackers to bypass authentication via repeated attempts using any username and password. NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigned CVE-2004-0447. This candidate is ONLY for the ADSL router bypass.
The bug was discovered 02/18/2004. The weakness was released 05/27/2004 by Rafel Ivgi (The Insider) with iDEFENSE (Website). The advisory is shared for download at idefense.com. This vulnerability was named CVE-2004-0477 since 05/17/2004. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1211.
The vulnerability was handled as a non-public zero-day exploit for at least 99 days. During that time the estimated underground price was around $5k-$25k.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at support.3com.com.Proper firewalling of is able to address this issue. The best possible mitigation is suggested to be applying a restrictive firewalling.
The vulnerability is also documented in the databases at X-Force (16267), SecurityFocus (BID 10426†), OSVDB (18567†), Secunia (SA11716†) and SecurityTracker (ID 1010320†). Additional details are provided at 3com.com. Entry connected to this vulnerability is available at VDB-672. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: http://www.3com.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.4
VulDB Base Score: 6.5
VulDB Temp Score: 6.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Security checkCWE: CWE-358
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Patch: support.3com.com
Timeline
02/18/2004 🔍05/17/2004 🔍
05/27/2004 🔍
05/27/2004 🔍
05/27/2004 🔍
06/01/2004 🔍
12/06/2004 🔍
08/05/2005 🔍
06/28/2019 🔍
Sources
Vendor: 3com.comAdvisory: idefense.com⛔
Researcher: Rafel Ivgi (The Insider)
Organization: iDEFENSE
Status: Not defined
CVE: CVE-2004-0477 (🔍)
GCVE (CVE): GCVE-0-2004-0477
GCVE (VulDB): GCVE-100-676
X-Force: 16267 - 3com OfficeConnect allows elevated access, High Risk
SecurityFocus: 10426 - 3Com OfficeConnect Remote 812 ADSL Router Web Interface Authentication Bypass Vulnerability
Secunia: 11716 - 3Com OfficeConnect 812 ADSL Router Multiple Vulnerabilities, Moderately Critical
OSVDB: 18567 - 3Com OfficeConnect 812 ADSL Router Authentication Bypass
SecurityTracker: 1010320
Misc.: 🔍
See also: 🔍
Entry
Created: 06/01/2004 12:50Updated: 06/28/2019 14:46
Changes: 06/01/2004 12:50 (76), 06/28/2019 14:46 (4)
Complete: 🔍
Cache ID: 216:89C:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.