Vulnerability Note VU#278204
Verizon Fios Actiontec model MI424WR-GEN3I router vulnerable to cross-site request forgery
The Verizon FIOS Actiontec router model MI424WR-GEN3I is susceptible to cross-site request forgery attacks. (CWE-352)
The Verizon FIOS Actiontec router model MI424WR-GEN3I is susceptible to cross-site request forgery attacks. (CWE-352) A remote attacker that is able to trick a user into clicking a malicious link while logged into the router may be able to compromise the router.
A remote unauthenticated attacker that is able to trick a user into clicking a malicious link while they are logged into the router may be able to compromise the router.
We are currently unaware of a practical solution to this problem. Please consider the following workarounds.
Verify the router's web interface is not Internet accessible. As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the router web interface using stolen credentials from a blocked network location.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Verizon||Affected||01 Feb 2013||18 Mar 2013|
CVSS Metrics (Learn More)
Thanks to Jacob Holcomb of Independent Security Evaluators for reporting this vulnerability.
This document was written by Jared Allar.
- CVE IDs: CVE-2013-0126
- Date Public: 18 Mar 2013
- Date First Published: 18 Mar 2013
- Date Last Updated: 05 Dec 2013
- Document Revision: 21
If you have feedback, comments, or additional information about this vulnerability, please send us email.