Vulnerability Description
Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alcatel | Adsl Modem 1000 | All versions |
| Alcatel | Speed Touch Adsl Modem | home |
References
- http://www.cert.org/advisories/CA-2001-08.htmlThird Party AdvisoryUS Government Resource
- http://www.kb.cert.org/vuls/id/211736Third Party AdvisoryUS Government Resource
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6336
- http://www.cert.org/advisories/CA-2001-08.htmlThird Party AdvisoryUS Government Resource
- http://www.kb.cert.org/vuls/id/211736Third Party AdvisoryUS Government Resource
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6336
FAQ
What is CVE-2001-1484?
CVE-2001-1484 is a vulnerability with a CVSS score of 7.5 (HIGH). Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) si...
How severe is CVE-2001-1484?
CVE-2001-1484 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1484?
Check the references section above for vendor advisories and patch information. Affected products include: Alcatel Adsl Modem 1000, Alcatel Speed Touch Adsl Modem.