3 results (0.057 seconds)

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

The challenge-response authentication of the EXPERT user for Alcatel Speed Touch running firmware KHDSAA.108 and KHDSAA.132 through KHDSAA.134 allows remote attackers to gain privileges by directly computing the response based on information that is provided by the device during login. • http://security.sdsc.edu/self-help/alcatel/alcatel-bugs.html http://www.cert.org/advisories/CA-2001-08.html http://www.kb.cert.org/vuls/id/243592 http://www.securityfocus.com/archive/1/175229 http://www.securityfocus.com/bid/2568 https://exchange.xforce.ibmcloud.com/vulnerabilities/6354 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

Alcatel Speed Touch ADSL modem running firmware KHDSAA.108, KHDSAA.132, KHDSBA.133, and KHDSAA.134 has a blank default password, which allows remote attackers to gain unauthorized access. • http://security.sdsc.edu/self-help/alcatel/alcatel-bugs.html http://www.cert.org/advisories/CA-2001-08.html http://www.kb.cert.org/vuls/id/212088 http://www.securityfocus.com/archive/1/175229 http://www.securityfocus.com/bid/2568 https://exchange.xforce.ibmcloud.com/vulnerabilities/6335 •

CVSS: 7.5EPSS: 2%CPEs: 4EXPL: 0

Alcatel Speed Touch running firmware KHDSAA.108 and KHDSAA.132 through KHDSAA.134 has a TFTP server running without a password, which allows remote attackers to change firmware versions or the device's configurations. • http://www.cert.org/advisories/CA-2001-08.html http://www.kb.cert.org/vuls/id/490344 http://www.securityfocus.com/archive/1/175229 http://www.securityfocus.com/bid/2566 https://exchange.xforce.ibmcloud.com/vulnerabilities/6336 •