ID

VAR-200508-0116


CVE

CVE-2005-2589


TITLE

Linksys WRT54GS Authentication bypass vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200508-177

DESCRIPTION

Unknown vulnerability in Linksys WRT54GS wireless router with firmware 4.50.6, with WPA Personal/TKIP authentication enabled, allows remote clients to bypass authentication by connecting without using encryption. Reportedly the device permits client devices that are using no encryption to connect when an encryption setting is being used. This results in a false sense of security. This issue is reported to affect firmware version 4.50.6; other firmware versions may also be affected. This issue also appears to have been addressed in firmware version 4.70.6; this has not been confirmed by Symantec or the vendor. Further information suggests this issue occurs when a firmware upgrade to version 4.50.6 has occurred but the unit has not been reset to factory defaults. Resetting the unit once the firmware has been upgraded is part of the recommended Linksys upgrade procedure. Linksys WRT54GS is a wireless router device that combines several functions. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Linksys WRT54GS Wireless Encryption Security Bypass SECUNIA ADVISORY ID: SA16457 VERIFY ADVISORY: http://secunia.com/advisories/16457/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Linksys WRT54GS Wireless-G Broadband Router with SpeedBooster http://secunia.com/product/5549/ DESCRIPTION: Steve Scherf has reported a security issue in Linksys WRT54GS, which can be exploited by malicious people to bypass certain security restrictions. PROVIDED AND/OR DISCOVERED BY: Steve Scherf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-2589 // BID: 14566 // VULHUB: VHN-13798 // PACKETSTORM: 39447

AFFECTED PRODUCTS

vendor:linksysmodel:wrt54gsscope:eqversion:4.50.6

Trust: 1.9

vendor:linksysmodel:wrt54gsscope:neversion:4.70.6

Trust: 0.3

sources: BID: 14566 // CNNVD: CNNVD-200508-177 // NVD: CVE-2005-2589

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2589
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200508-177
value: HIGH

Trust: 0.6

VULHUB: VHN-13798
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-2589
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13798
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-13798 // CNNVD: CNNVD-200508-177 // NVD: CVE-2005-2589

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2589

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200508-177

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200508-177

EXTERNAL IDS

db:BIDid:14566

Trust: 2.0

db:SECUNIAid:16457

Trust: 1.8

db:SECTRACKid:1014721

Trust: 1.7

db:NVDid:CVE-2005-2589

Trust: 1.7

db:CNNVDid:CNNVD-200508-177

Trust: 0.7

db:BUGTRAQid:20050815 SERIOUS FLAW IN LINKSYS WIRELESS AP PASSWORD SECURITY

Trust: 0.6

db:VULHUBid:VHN-13798

Trust: 0.1

db:PACKETSTORMid:39447

Trust: 0.1

sources: VULHUB: VHN-13798 // BID: 14566 // PACKETSTORM: 39447 // CNNVD: CNNVD-200508-177 // NVD: CVE-2005-2589

REFERENCES

url:http://www.securityfocus.com/bid/14566

Trust: 1.7

url:http://www.securityfocus.com/archive/1/408161

Trust: 1.7

url:http://securitytracker.com/id?1014721

Trust: 1.7

url:http://secunia.com/advisories/16457

Trust: 1.7

url:http://www.linksys.com/

Trust: 0.3

url:http://www.linksys.com/servlet/satellite?childpagename=us%2flayout&packedargs=c%3dl_product_c2%26cid%3d1115416825841%26site%3dus&pagename=linksys%2fcommon%2fvisitorwrapper

Trust: 0.3

url:/archive/1/408246

Trust: 0.3

url:/archive/1/408271

Trust: 0.3

url:/archive/1/408161

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/16457/

Trust: 0.1

url:http://secunia.com/product/5549/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-13798 // BID: 14566 // PACKETSTORM: 39447 // CNNVD: CNNVD-200508-177 // NVD: CVE-2005-2589

CREDITS

Steve Scherf bugtraq@moonsoft.com

Trust: 0.6

sources: CNNVD: CNNVD-200508-177

SOURCES

db:VULHUBid:VHN-13798
db:BIDid:14566
db:PACKETSTORMid:39447
db:CNNVDid:CNNVD-200508-177
db:NVDid:CVE-2005-2589

LAST UPDATE DATE

2024-08-14T15:36:04.409000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-13798date:2008-09-05T00:00:00
db:BIDid:14566date:2005-08-15T00:00:00
db:CNNVDid:CNNVD-200508-177date:2005-10-20T00:00:00
db:NVDid:CVE-2005-2589date:2008-09-05T20:52:09.973

SOURCES RELEASE DATE

db:VULHUBid:VHN-13798date:2005-08-17T00:00:00
db:BIDid:14566date:2005-08-15T00:00:00
db:PACKETSTORMid:39447date:2005-08-18T06:52:44
db:CNNVDid:CNNVD-200508-177date:2005-08-17T00:00:00
db:NVDid:CVE-2005-2589date:2005-08-17T04:00:00