Korean
<< Back
VID 29092
Severity 40
Port 23
Protocol TCP
Class Telnet
Detailed Description The target Alcatel ADSL modem has no password set.
Alcatel Asymmetric Digital Subscriber Line (ADSL) modems are shipped with blank passwords. A remote attacker could gain read or write privileges to the configuration file to take control over the device using Telnet or HTTP. The attacker could use this weakness to gain unauthorized access to your modem and then reconfigure the modem. In the case of TELNET and HTTP, this vulnerability grants the attacker read and write access to device configuration. For FTP, this vulnerability allows the attacker to browse the file structure of the affected device.

* References:
http://www.alcatel.com/consumer/dsl/security.htm
http://www.cert.org/advisories/CA-2001-08.html
http://archives.neohapsis.com/archives/bugtraq/2001-04/0142.html
https://www.kb.cert.org/vuls/id/212088
http://security.sdsc.edu/self-help/alcatel/
http://security.sdsc.edu/self-help/alcatel/alcatel-bugs.html

* Platforms Affected:
Alcatel ADSL Network Termination Device 1000
Alcatel Speed Touch ADSL modem Home
Recommendation Telnet to the passwordless modem and set a password for the Alcatel ADSL modem immediately.

Contact your vendor for more details.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL 6335 (ISS)