First published: Thu Feb 10 2005(Updated: )
Zyxel P310, P314, P324 and Netgear RT311, RT314 running the latest firmware, allows remote attackers on the WAN to obtain the IP address of the LAN side interface by pinging a valid LAN IP address, which generates an ARP reply from the WAN address side that maps the LAN IP address to the WAN's MAC address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZyXEL Prestige | =314 | |
ZyXEL Prestige | =310 | |
NetGear RT314 | ||
ZyXEL Prestige | =324 | |
Netgear Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0328 is considered a medium severity vulnerability due to potential information disclosure.
To mitigate CVE-2005-0328, it is recommended to apply the latest firmware updates from Zyxel or Netgear.
CVE-2005-0328 affects Zyxel Prestige models 310, 314, and 324, as well as Netgear RT311 and RT314 devices.
CVE-2005-0328 is an information disclosure vulnerability that allows remote attackers to infer local LAN IP addresses.
Yes, CVE-2005-0328 can be exploited remotely by sending a ping to a valid LAN IP address from the WAN side.