First published: Mon Nov 21 2005(Updated: )
Zyxel P2000W Version 1 VOIP WIFI Phone Wj.00.10 uses hardcoded IP addresses for its DNS servers, which could allow remote attackers to cause a denial of service or hijack Zyxel phones by attacking or spoofing the hardcoded DNS servers. NOTE: it could be argued that this issue reflects an inherent limitation of DNS itself, so perhaps it should not be included in CVE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel Prestige 2000w V.1voip Wi-fi Phone | =wj.00.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3725 is considered a moderate severity vulnerability due to its potential for denial of service and remote access exploitation.
To mitigate CVE-2005-3725, avoid using the Zyxel P2000W with hardcoded DNS servers and instead configure a secure and trusted DNS server.
The affected device is the Zyxel Prestige 2000W Version 1 VoIP Wi-Fi Phone running firmware version WJ.00.10.
Yes, CVE-2005-3725 can be exploited remotely if an attacker targets the hardcoded DNS servers used by the affected Zyxel phones.
The risks associated with CVE-2005-3725 include potential denial of service attacks and the possibility of hijacking the affected VoIP devices.