First published: Sun Dec 27 2015(Updated: )
Buffalo WZR-600DHP2 devices with firmware 2.09, 2.13, and 2.16 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Buffalotech Airstation Extreme N600 Firmware | =2.09 | |
Buffalotech Airstation Extreme N600 Firmware | =2.13 | |
Buffalotech Airstation Extreme N600 Firmware | =2.16 | |
Buffalotech Airstation Extreme N600 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8262 is classified as a medium severity vulnerability due to the potential for remote attackers to spoof DNS responses.
To mitigate CVE-2015-8262, update the firmware of your Buffalo WZR-600DHP2 device to a version that is not affected by this vulnerability.
CVE-2015-8262 affects Buffalo WZR-600DHP2 devices running firmware versions 2.09, 2.13, and 2.16.
Yes, CVE-2015-8262 can be exploited remotely by attackers who can predict the ID value in DNS query headers.
CVE-2015-8262 can allow for DNS spoofing attacks, where an attacker can send false DNS responses to redirect users.