First published: Thu Jul 13 2017(Updated: )
SYN Flood or FIN Flood attack in ECos 1 and other versions embedded devices results in web Authentication Bypass. "eCos Embedded Web Servers used by Multiple Routers and Home devices, while sending SYN Flood or FIN Flood packets fails to validate and handle the packets and does not ask for any sign of authentication resulting in Authentication Bypass. An attacker can take complete advantage of this bug and take over the device remotely or locally. The bug has been successfully tested and reproduced in some versions of SOHO Routers manufactured by TOTOLINK, GREATEK and others."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
eCos | <=1.3.1 | |
GREATEK SOHO | ||
TOTOLINK SOHO |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000020 is classified as a high severity vulnerability due to its potential for web authentication bypass.
To mitigate CVE-2017-1000020, update to the latest version of eCos Embedded Web Servers beyond 1.3.1 if available.
CVE-2017-1000020 affects eCos Embedded Web Servers and devices utilizing versions up to 1.3.1.
CVE-2017-1000020 allows SYN Flood or FIN Flood attacks that can lead to authentication bypass.
Currently, the best workaround for CVE-2017-1000020 is to implement network-level protections against SYN and FIN Flood attacks.