First published: Tue Apr 10 2001(Updated: )
The challenge-response authentication of the EXPERT user for Alcatel Speed Touch running firmware KHDSAA.108 and KHDSAA.132 through KHDSAA.134 allows remote attackers to gain privileges by directly computing the response based on information that is provided by the device during login.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel Speed Touch Home | =khdsaa.133 | |
Alcatel Speed Touch Home | =khdsaa.134 | |
Alcatel Speed Touch Home | =khdsaa.132 | |
Alcatel Speed Touch Home | =khdsaa.108 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1425 is considered a high-severity vulnerability due to the potential for remote attackers to gain elevated privileges.
To mitigate CVE-2001-1425, upgrade the Alcatel Speed Touch firmware to a version that is not vulnerable, specifically beyond khdsaa.134.
CVE-2001-1425 affects Alcatel Speed Touch Home devices running firmware versions khdsaa.108, khdsaa.132, khdsaa.133, and khdsaa.134.
Yes, CVE-2001-1425 can be exploited remotely by attackers using the challenge-response authentication mechanism.
CVE-2001-1425 allows attackers to compute the challenge-response, enabling them to gain unauthorized access to the device.