{"vuid":"VU#341526","idnumber":"341526","name":"Huawei E355 contains a direct request vulnerability","keywords":["huawei","e355","direct request","cwe-425"],"overview":"Huawei E355 USB WiFi adapter with firmware version: 21.157.37.01.910 has been reported to contain a direct request vulnerability in the web interface. (CWE-425)","clean_desc":"Huawei E355 USB WiFi adapter with firmware version: 21.157.37.01.910 has been reported to contain a direct request vulnerability in the web interface. An attacker is able to directly access specific URL's of the device's web interface to gather sensitive configuration information and also change the configuration without authenticating to the device. The reporter, Jimson K James, has written a metasploit module to exploit the vulnerability.","impact":"A remote unauthenticated attacker on an adjacent network may be able to change the administrator's password and reconfigure the device.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Jimson K James for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["https://github.com/aczire/huawei-csrf-info_disclosure/blob/master/huawei_wifi_info.rb","http://consumer.huawei.com/en/mobile-broadband/wingle/features/e355-en.htm","http://cwe.mitre.org/data/definitions/425.html"],"cveids":["CVE-2013-6031"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-11-11T14:04:32Z","publicdate":"2014-03-06T00:00:00Z","datefirstpublished":"2014-03-06T14:53:07Z","dateupdated":"2014-03-06T14:53:09Z","revision":15,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:A/AC:M/Au:N/C:P/I:P/A:N","cvss_temporalscore":"3.3","cvss_environmentalscore":"0.8281843319547","cvss_environmentalvector":"CDP:N/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}