Vulnerabilities > CVE-2014-8886 - Cryptographic Issues vulnerability in AVM Fritz! OS 6.23

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
avm
CWE-310
critical

Summary

AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and consequently execute arbitrary code, via a crafted firmware image.

Vulnerable Configurations

Part Description Count
OS
Avm
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/135161/rt-sa-2014-014.txt
idPACKETSTORM:135161
last seen2016-12-05
published2016-01-07
reporterredteam-pentesting.de
sourcehttps://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Execution-Via-Firmware-Images.html
titleAVM FRITZ!Box: Arbitrary Code Execution Via Firmware Images