Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication.
References
Link | Resource |
---|---|
http://www.cert.org/advisories/CA-2001-08.html | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/211736 | Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6336 | |
http://www.cert.org/advisories/CA-2001-08.html | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/211736 | Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6336 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.cert.org/advisories/CA-2001-08.html - Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/211736 - Third Party Advisory, US Government Resource | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6336 - |
Information
Published : 2001-12-31 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1484
Mitre link : CVE-2001-1484
CVE.ORG link : CVE-2001-1484
JSON object : View
Products Affected
alcatel
- speed_touch_adsl_modem
- adsl_modem_1000
CWE