CERT Recently Published Vulnerability Notes 2024年07月06日
VU#304455: Authentication Bypass in Tenda N300 Wireless N VDSL2 Modem Router
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Tenda N300 无线 N VDSL2 调制解调器路由器存在身份验证绕过漏洞(CVE-2023-4498),允许远程未经身份验证的攻击者访问敏感信息。攻击者可以通过构建包含白名单关键字的 Web 请求来绕过身份验证,从而访问通常需要身份验证才能访问的页面,例如管理密码等敏感信息。

🎯 **身份验证绕过漏洞**: Tenda N300 无线路由器存在一个身份验证绕过漏洞,允许远程未经身份验证的攻击者访问敏感信息。

🔑 **漏洞原理**: 攻击者可以通过构建包含白名单关键字的 Web 请求来绕过身份验证。当路由器接收到包含特定关键字的请求时,它会直接提供相应的资源,而不会进行身份验证或提示。

🛡️ **潜在影响**: 攻击者可以利用此漏洞访问通常需要身份验证才能访问的页面,例如管理页面、配置信息、用户凭据等。攻击者可以利用这些信息来进行进一步的攻击,例如更改路由器配置、窃取用户数据或进行拒绝服务攻击。

🆘 **解决方案**: 目前尚无已知的解决方案。建议用户更新路由器固件到最新版本,并禁用远程管理服务和 Web 界面。

🤝 **协作**: 该漏洞由 Spike Reply 网络安全团队报告,并由 Timur Snoke 编写的文档。

Overview

An authentication bypass vulnerability exists in the N300 Wireless N VDSL2 Modem Router manufactured by Tenda. This vulnerability allows a remote, unauthenticated user to access sensitive information.

Description

CVE-2023-4498 is an authentication bypass vulnerability that enables an unauthenticated attacker who has access to the web console, either locally or remotely, to access resources that would normally be protected. The attacker can construct a web request that includes a white-listed keyword in the path, causing the URL to be served directly (rather than blocked or challenged with an authentication prompt).

Impact

Successful exploitation of this vulnerability could grant the attacker access to pages that would otherwise require authentication. An unauthenticated attacker could thereby gain access to sensitive information, such as the Administrative password, which could be used to launch additional attacks.

Solution

There is no known solution to the vulnerability. Always update your router to the latest available firmware version. Disabling both the remote (WAN-side) administration services and the web interface on the WAN on any SoHo router is also recommended.

Acknowledgements

Thanks to the reporter from the Spike Reply Cybersecurity Team. This document was written by Timur Snoke.

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs: CVE-2023-4498
Date Public: 2023-09-06
Date First Published: 2023-09-06
Date Last Updated: 2023-09-06 20:09 UTC
Document Revision: 2

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Tenda N300 身份验证绕过 CVE-2023-4498 路由器安全
相关文章