First published: Thu Dec 31 2015(Updated: )
ReadyNet WRT300N-DD devices with firmware 1.0.26 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Readynet Solutions Wrt300n-dd | =1.0.26 | |
Readynet Solutions Wrt300n-dd Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7282 has been classified as a medium severity vulnerability due to the potential for remote attackers to spoof DNS responses.
To mitigate CVE-2015-7282, it is recommended to upgrade the firmware of the ReadyNet WRT300N-DD to the latest version that addresses this vulnerability.
The risks associated with CVE-2015-7282 include the possibility of remote attackers successfully impersonating legitimate DNS responses, leading to possible data theft or redirection.
CVE-2015-7282 affects users of ReadyNet WRT300N-DD devices running firmware version 1.0.26.
CVE-2015-7282 is a DNS spoofing vulnerability that arises from the use of a consistent source port for DNS queries, allowing easier interception by attackers.