First published: Mon Dec 31 2001(Updated: )
Alcatel ADSL modems allow remote attackers to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel Speed Touch Home | =home | |
Alcatel ADSL Modem 1000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1484 is considered a high severity vulnerability due to its potential for exploitation by remote attackers.
To mitigate CVE-2001-1484, disable TFTP access on the Alcatel ADSL modems or configure strict access controls.
CVE-2001-1484 affects the Alcatel Speed Touch ADSL modem and Alcatel ADSL Modem 1000.
Yes, CVE-2001-1484 can be exploited remotely via a bounce attack from a local area network system.
An attacker exploiting CVE-2001-1484 can modify the firmware and configuration of the ADSL modem without authentication.