ID

VAR-201404-0106


CVE

CVE-2013-3588


TITLE

Zyxel P660 series modem/router denial of service vulnerability

Trust: 0.8

sources: CERT/CC: VU#893726

DESCRIPTION

The web management interface on Zyxel P660 devices allows remote attackers to cause a denial of service (reboot) via a flood of TCP SYN packets. ZyXEL Communications Corp. Provided by P660 The web management screen of the series shows service disruption (DoS) Vulnerabilities exist.The product may be restarted by a remote third party. Zyxel P660 Series Routers are ADSL router devices. Zyxel P660 series routers are prone to a remote denial-of-service vulnerability

Trust: 3.24

sources: NVD: CVE-2013-3588 // CERT/CC: VU#893726 // JVNDB: JVNDB-2014-001864 // CNVD: CNVD-2014-02096 // BID: 66570 // VULMON: CVE-2013-3588

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02096

AFFECTED PRODUCTS

vendor:zyxelmodel:p-660h-t1scope:eqversion:v2

Trust: 2.4

vendor:zyxelmodel:p-660h-t3scope:eqversion:v2

Trust: 2.4

vendor:zyxelmodel:p-660h-t1scope:eqversion: -

Trust: 1.6

vendor:zyxelmodel:p-660h-d1scope:eqversion: -

Trust: 1.6

vendor:zyxelmodel:p-660hw t3scope:eqversion:v2

Trust: 1.6

vendor:zyxelmodel:p-660hw t3scope:eqversion: -

Trust: 1.6

vendor:zyxelmodel:p-660h-63scope:eqversion: -

Trust: 1.6

vendor:zyxelmodel:p-660h-67scope:eqversion: -

Trust: 1.6

vendor:zyxelmodel:p-660h-61scope:eqversion: -

Trust: 1.6

vendor:zyxelmodel:p-660h-d3scope:eqversion: -

Trust: 1.6

vendor:zyxelmodel:p-660hw d1scope:eqversion: -

Trust: 1.0

vendor:zyxelmodel:p-660hw d1scope:eqversion:v2

Trust: 1.0

vendor:zyxelmodel:p-660hwscope:eqversion:_t1

Trust: 1.0

vendor:zyxelmodel:p-660hw d3scope:eqversion: -

Trust: 1.0

vendor:zyxelmodel: - scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660h-61scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660h-63scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660h-67scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660h-d1scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660h-d3scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660h-t1scope:eqversion:none

Trust: 0.8

vendor:zyxelmodel:p-660h-t3scope:eqversion:none

Trust: 0.8

vendor:zyxelmodel:p-660hw-d1scope:eqversion:none

Trust: 0.8

vendor:zyxelmodel:p-660hw-d1scope:eqversion:v2

Trust: 0.8

vendor:zyxelmodel:p-660hw-d3scope: - version: -

Trust: 0.8

vendor:zyxelmodel:p-660hw-t1scope:eqversion:none

Trust: 0.8

vendor:zyxelmodel:p-660hw-t1scope:eqversion:v2

Trust: 0.8

vendor:zyxelmodel:p-660hw-t3scope:eqversion:none

Trust: 0.8

vendor:zyxelmodel:p-660hw-t3scope:eqversion:v2

Trust: 0.8

vendor:zyxelmodel:p660 series routersscope: - version: -

Trust: 0.6

sources: CERT/CC: VU#893726 // CNVD: CNVD-2014-02096 // JVNDB: JVNDB-2014-001864 // CNNVD: CNNVD-201404-027 // NVD: CVE-2013-3588

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3588
value: HIGH

Trust: 1.0

NVD: CVE-2013-3588
value: HIGH

Trust: 0.8

IPA: JVNDB-2014-001864
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-02096
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201404-027
value: HIGH

Trust: 0.6

VULMON: CVE-2013-3588
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-3588
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2013-3588
severity: HIGH
baseScore: 7.1
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2014-001864
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2014-02096
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CERT/CC: VU#893726 // CNVD: CNVD-2014-02096 // VULMON: CVE-2013-3588 // JVNDB: JVNDB-2014-001864 // CNNVD: CNNVD-201404-027 // NVD: CVE-2013-3588

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2014-001864 // NVD: CVE-2013-3588

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-027

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201404-027

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001864

PATCH

title:P-660HW Seriesurl:http://www.zyxel.com/products_services/p_660hw_series.shtml?t=p

Trust: 0.8

title:P-660H Seriesurl:http://www.zyxel.com/products_services/p_660h_series.shtml

Trust: 0.8

title:cve-searchurl:https://github.com/r3p3r/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/cve-search/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/dim0niu/cve-search

Trust: 0.1

title:cve-search-srcurl:https://github.com/extremenetworks/cve-search-src

Trust: 0.1

title: - url:https://github.com/ZIEN-TF/z_iot_cve-search-api

Trust: 0.1

title:modified_cve-searchurl:https://github.com/HR-CERT/modified_cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/swastik99/cve-search

Trust: 0.1

title:cve-search-ngurl:https://github.com/cve-search/cve-search-ng

Trust: 0.1

title:cveurl:https://github.com/zwei2008/cve

Trust: 0.1

title:cve-searchurl:https://github.com/miradam/cve-search

Trust: 0.1

title:cve-searchurl:https://github.com/swastik99/cve-search-master

Trust: 0.1

sources: VULMON: CVE-2013-3588 // JVNDB: JVNDB-2014-001864

EXTERNAL IDS

db:CERT/CCid:VU#893726

Trust: 3.9

db:NVDid:CVE-2013-3588

Trust: 3.4

db:BIDid:66570

Trust: 1.0

db:JVNid:JVNVU91435937

Trust: 0.8

db:JVNDBid:JVNDB-2014-001864

Trust: 0.8

db:OSVDBid:105244

Trust: 0.6

db:CNVDid:CNVD-2014-02096

Trust: 0.6

db:CNNVDid:CNNVD-201404-027

Trust: 0.6

db:VULMONid:CVE-2013-3588

Trust: 0.1

sources: CERT/CC: VU#893726 // CNVD: CNVD-2014-02096 // VULMON: CVE-2013-3588 // BID: 66570 // JVNDB: JVNDB-2014-001864 // CNNVD: CNNVD-201404-027 // NVD: CVE-2013-3588

REFERENCES

url:http://www.kb.cert.org/vuls/id/893726

Trust: 3.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3588

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91435937/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3588

Trust: 0.8

url:http://osvdb.com/show/osvdb/105244

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://www.securityfocus.com/bid/66570

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/r3p3r/cve-search

Trust: 0.1

url:https://github.com/cve-search/cve-search

Trust: 0.1

sources: CERT/CC: VU#893726 // CNVD: CNVD-2014-02096 // VULMON: CVE-2013-3588 // JVNDB: JVNDB-2014-001864 // CNNVD: CNNVD-201404-027 // NVD: CVE-2013-3588

CREDITS

Alex French

Trust: 0.3

sources: BID: 66570

SOURCES

db:CERT/CCid:VU#893726
db:CNVDid:CNVD-2014-02096
db:VULMONid:CVE-2013-3588
db:BIDid:66570
db:JVNDBid:JVNDB-2014-001864
db:CNNVDid:CNNVD-201404-027
db:NVDid:CVE-2013-3588

LAST UPDATE DATE

2024-11-23T21:45:17.125000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#893726date:2014-04-01T00:00:00
db:CNVDid:CNVD-2014-02096date:2014-04-03T00:00:00
db:VULMONid:CVE-2013-3588date:2014-04-02T00:00:00
db:BIDid:66570date:2014-04-01T00:00:00
db:JVNDBid:JVNDB-2014-001864date:2014-04-07T00:00:00
db:CNNVDid:CNNVD-201404-027date:2014-04-03T00:00:00
db:NVDid:CVE-2013-3588date:2024-11-21T01:53:56.450

SOURCES RELEASE DATE

db:CERT/CCid:VU#893726date:2014-04-01T00:00:00
db:CNVDid:CNVD-2014-02096date:2014-04-03T00:00:00
db:VULMONid:CVE-2013-3588date:2014-04-02T00:00:00
db:BIDid:66570date:2014-04-01T00:00:00
db:JVNDBid:JVNDB-2014-001864date:2014-04-02T00:00:00
db:CNNVDid:CNNVD-201404-027date:2014-04-03T00:00:00
db:NVDid:CVE-2013-3588date:2014-04-02T03:58:16.967