First published: Thu Dec 31 2015(Updated: )
Belkin F9K1102 2 devices with firmware 2.10.17 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel GS1900-10HP firmware | <2.50\(aazi.0\)c0 | |
Zyxel GS1900-10HP firmware | <2.50\(aazi.0\)c0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5987 has been assigned a medium severity rating due to its potential for remote code execution through DNS spoofing.
To fix CVE-2015-5987, update the firmware of your Belkin F9K1102 router to the latest version that resolves this vulnerability.
The primary risk of CVE-2015-5987 is that attackers can hijack DNS queries and redirect users to malicious websites.
CVE-2015-5987 specifically affects Belkin F9K1102 routers running an outdated firmware version.
There have been reports indicating that CVE-2015-5987 could be exploited by attackers, so it is important to apply necessary updates promptly.