The challenge-response authentication of the EXPERT user for Alcatel Speed Touch running firmware KHDSAA.108 and KHDSAA.132 through KHDSAA.134 allows remote attackers to gain privileges by directly computing the response based on information that is provided by the device during login.
                
            References
                    | Link | Resource | 
|---|---|
| http://security.sdsc.edu/self-help/alcatel/alcatel-bugs.html | |
| http://www.cert.org/advisories/CA-2001-08.html | US Government Resource | 
| http://www.kb.cert.org/vuls/id/243592 | US Government Resource | 
| http://www.securityfocus.com/archive/1/175229 | |
| http://www.securityfocus.com/bid/2568 | Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/6354 | |
| http://security.sdsc.edu/self-help/alcatel/alcatel-bugs.html | |
| http://www.cert.org/advisories/CA-2001-08.html | US Government Resource | 
| http://www.kb.cert.org/vuls/id/243592 | US Government Resource | 
| http://www.securityfocus.com/archive/1/175229 | |
| http://www.securityfocus.com/bid/2568 | Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/6354 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2001-04-10 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-1425
Mitre link : CVE-2001-1425
CVE.ORG link : CVE-2001-1425
JSON object : View
Products Affected
                alcatel
- speed_touch_home
CWE
                