{"vuid":"VU#893726","idnumber":"893726","name":"Zyxel P660 series modem/router denial of service vulnerability","keywords":["Zyxel","P660","denial of service"],"overview":"Zyxel P660 series modem/router contains a denial of service vulnerability when parsing a high volume of SYN packets on the web management interface.","clean_desc":"It has been reported that Zyxel P660 series modem/router (and possibly other models which share the same core firmware) fail to parse a high volume of SYN packets on the web management interface correctly causing the device to reboot. By default, the device runs a web management interface on port tcp/80 which is accessible remotely (LAN and WAN sides).","impact":"An unauthenticated attacker can cause the device to reboot and become unavailable by sending a stream of SYN packets to the device's web management interface.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Restrict Network Access As a general good security practice, only allow connections from trusted hosts and networks if possible. Restricting access would prevent an attacker from connecting to the service from a blocked network location.","sysaffected":"","thanks":"Thanks to Alex French for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","w","w","w",".","z","y","x","e","l",".","c","o","m","/","p","r","o","d","u","c","t","s","_","s","e","r","v","i","c","e","s","/","p","_","6","6","0","h","_","s","e","r","i","e","s",".","s","h","t","m","l","?","t","=","p"],"cveids":["CVE-2013-3588"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-06-11T12:14:22Z","publicdate":"2013-08-06T00:00:00Z","datefirstpublished":"2014-04-01T14:43:44Z","dateupdated":"2014-04-01T14:43:44Z","revision":11,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"N","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.1","cvss_basevector":"AV:N/AC:M/Au:N/C:N/I:N/A:C","cvss_temporalscore":"5.4","cvss_environmentalscore":"4.0874333724","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}