Vulnerability Note VU#561444
Multiple broadband routers use vulnerable versions of Allegro RomPager
Multiple broadband routers use vulnerable versions of Allegro RomPager in current firmware releases.
Many home and office/home office (SOHO) routers have been found to be using vulnerable versions of the Allegro RomPager embedded web server. Allegro RomPager versions prior to 4.34 contain a vulnerability in cookie processing code that can be leveraged to grant attackers administrative privileges on the device. According to Check Point's advisory, the vulnerability was addressed by Allegro in 2005 but is present in current or recent firmware releases of many devices.
A remote, unauthenticated attacker may be able to execute arbitrary code on the device.
Apply an update
Check vendor websites for a firmware update that addresses this issue and apply it if available.
Use third-party firmware
Vendor Information (Learn More)
Check Point Software Technologies has published a list of devices (PDF) suspected of being vulnerable. We will update the Vendor Information section below as more information becomes available.
|Vendor||Status||Date Notified||Date Updated|
|Allegro Software Development Corporation||Not Affected||19 Dec 2014||19 Dec 2014|
|Peplink||Not Affected||-||08 Jan 2015|
|D-Link Systems, Inc.||Unknown||-||19 Dec 2014|
|Huawei Technologies||Unknown||-||19 Dec 2014|
|Linksys||Unknown||-||19 Dec 2014|
|NetComm Wireless Limited||Unknown||-||19 Dec 2014|
|TP-LINK||Unknown||19 Dec 2014||19 Dec 2014|
|ZTE Corporation||Unknown||-||19 Dec 2014|
|ZyXEL||Unknown||-||19 Dec 2014|
CVSS Metrics (Learn More)
Thanks to Shahar Tal of Check Point Software Technologies for reporting this vulnerability.
This document was written by Joel Land.
- CVE IDs: CVE-2014-9222
- Date Public: 19 Dec 2014
- Date First Published: 19 Dec 2014
- Date Last Updated: 08 Jan 2015
- Document Revision: 24
If you have feedback, comments, or additional information about this vulnerability, please send us email.