CVE-2002-2133

Telindus 1100 ASDL router running firmware 6.0.x uses weak encryption for UDP session traffic, which allows remote attackers to gain unauthorized access by sniffing and decrypting the administrative password.
Configurations

Configuration 1 (hide)

cpe:2.3:h:telindus:1120_adsl_router:6.0.21b_firmware:*:*:*:*:*:*:*

History

20 Nov 2024, 23:42

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2002-12/0262.html - Patch () http://archives.neohapsis.com/archives/bugtraq/2002-12/0262.html - Patch
References () http://archives.neohapsis.com/archives/bugtraq/2003-02/0277.html - Exploit, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2003-02/0277.html - Exploit, Vendor Advisory
References () http://www.iss.net/security_center/static/10951.php - () http://www.iss.net/security_center/static/10951.php -
References () http://www.osvdb.org/4762 - () http://www.osvdb.org/4762 -
References () http://www.securityfocus.com/bid/6919 - () http://www.securityfocus.com/bid/6919 -

Information

Published : 2002-12-31 05:00

Updated : 2024-11-20 23:42


NVD link : CVE-2002-2133

Mitre link : CVE-2002-2133

CVE.ORG link : CVE-2002-2133


JSON object : View

Products Affected

telindus

  • 1120_adsl_router