Vulnerability Note VU#561444
Multiple broadband routers use vulnerable versions of Allegro RomPager
Original Release date: 19 Dec 2014 | Last revised: 08 Jan 2015

Overview
Multiple broadband routers use vulnerable versions of Allegro RomPager in current firmware releases.

Description
Many home and office/home office (SOHO) routers have been found to be using vulnerable versions of the Allegro RomPager embedded web server. Allegro RomPager versions prior to 4.34 contain a vulnerability in cookie processing code that can be leveraged to grant attackers administrative privileges on the device. According to Check Point’s advisory, the vulnerability was addressed by Allegro in 2005 but is present in current or recent firmware releases of many devices.

Impact
A remote, unauthenticated attacker may be able to execute arbitrary code on the device.

Solution
Apply an update
Check vendor websites for a firmware update that addresses this issue and apply it if available.
Use third-party firmware

Technical users may consider flashing to third-party firmware such as that provided by dd-wrt, openwrt, or others. Note that this action may invalidate device warranties.

Disable WAN services

If possible, disable services that listen for HTTP or HTTPS connections on the device’s WAN side.

Vendor Information (Learn More)
Check Point Software Technologies has published a list of devices (PDF) suspected of being vulnerable. We will update the Vendor Information section below as more information becomes available.

VendorStatusDate NotifiedDate UpdatedAllegro Software Development CorporationNot Affected19 Dec 201419 Dec 2014
PeplinkNot Affected-08 Jan 2015
D-Link Systems, Inc.Unknown-19 Dec 2014
Huawei TechnologiesUnknown-19 Dec 2014
LinksysUnknown-19 Dec 2014
NetComm Wireless LimitedUnknown-19 Dec 2014
TP-LINKUnknown19 Dec 201419 Dec 2014
ZTE CorporationUnknown-19 Dec 2014
ZyXELUnknown-19 Dec 2014If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal
8.5
E:POC/RL:W/RC:C

Environmental
6.4
CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

http://mis.fortunecook.ie/
http://mis.fortunecook.ie/misfortune-cookie-tr069-protection-whitepaper.pdf
http://en.wikipedia.org/wiki/List_of_wireless_router_firmware_projects

“Misfortune Cookie” – Allegro Software Urges Manufacturers To Maintain Device Security


http://mis.fortunecook.ie/too-many-cooks-exploiting-tr069_tal-oppenheim_31c3.pdf

Credit

Thanks to Shahar Tal of Check Point Software Technologies for reporting this vulnerability.
This document was written by Joel Land.

Other Information

CVE IDs:
CVE-2014-9222

Date Public:
19 Dec 2014

Date First Published:
19 Dec 2014

Date Last Updated:
08 Jan 2015

Document Revision:
24

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply