CRITICAL · 9.8

CVE-2014-6436

Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary comm...

Vulnerability Description

Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.

CVSS Score

9.8

CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
AztechAdsl Dsl5018En \(1T1R\) Firmware-
AztechAdsl Dsl5018En \(1T1R\)-
AztechDsl705E Firmware-
AztechDsl705E-
AztechDsl705Eu Firmware-
AztechDsl705Eu-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-6436?

CVE-2014-6436 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary comm...

How severe is CVE-2014-6436?

CVE-2014-6436 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2014-6436?

Check the references section above for vendor advisories and patch information. Affected products include: Aztech Adsl Dsl5018En \(1T1R\) Firmware, Aztech Adsl Dsl5018En \(1T1R\), Aztech Dsl705E Firmware, Aztech Dsl705E, Aztech Dsl705Eu Firmware.