Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.142868 |
Kategorie: | Web application abuses |
Titel: | Zyxel Gateway / Access Point External DNS Request Vulnerability |
Zusammenfassung: | Some Zyxel Access Points are prone to an information disclosure vulnerability; where external DNS requests can be made. |
Beschreibung: | Summary: Some Zyxel Access Points are prone to an information disclosure vulnerability where external DNS requests can be made. Vulnerability Insight: A DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall. Vulnerability Impact: The vulnerability could allow an unauthenticated individual to spam an internal service or probe whether domain names are present on the internal network behind the firewall, which could result in internal DNS information disclosure. Affected Software/OS: Zyxel ATP200, ATP500, ATP800, UAG2100, UAG4100, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200, VPN50, VPN100, VPN300, ZyWALL110, ZyWALL310, ZyWALL1100, NXC2500 and NXC5500. Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2019 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |