Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0379: The Netopia R9100 router does not prevent authenticated users from modifying SNMP tables, even if th

0
Low
VulnerabilityCVE-2000-0379cve-2000-0379
Published: Tue May 16 2000 (05/16/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: netopia
Product: r-series_routers

Description

The Netopia R9100 router does not prevent authenticated users from modifying SNMP tables, even if the administrator has configured it to do so.

AI-Powered Analysis

AILast updated: 06/19/2025, 19:03:19 UTC

Technical Analysis

CVE-2000-0379 is a vulnerability affecting the Netopia R9100 router, specifically version 4.6.2. The issue arises because the router fails to enforce restrictions on authenticated users attempting to modify SNMP (Simple Network Management Protocol) tables, even when the administrator has configured the device to prevent such modifications. SNMP is commonly used for network management and monitoring, and its tables contain critical configuration and operational data. In this case, an authenticated user—meaning someone who has already gained access credentials—can alter SNMP tables that should be protected, potentially changing router configurations or network behavior. The vulnerability does not allow unauthenticated access, and exploitation requires local or network-level authenticated access. The CVSS score is 3.6 (low), with the vector AV:L/AC:L/Au:N/C:P/I:P/A:N, indicating that the attack requires local access, low attack complexity, no additional authentication beyond initial access, and impacts confidentiality and integrity but not availability. A patch is available from the vendor to address this issue, as referenced in the provided links. No known exploits have been reported in the wild, and the vulnerability dates back to the year 2000, indicating it is an older issue that may still be present in legacy systems.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to the potential unauthorized modification of network device configurations by authenticated users. If an attacker or malicious insider gains authenticated access to the affected Netopia R9100 routers, they could alter SNMP tables to manipulate network monitoring data, disable security controls, or reroute traffic, potentially leading to confidentiality breaches or integrity violations. However, the vulnerability does not allow for denial of service or availability disruption directly. Given the age of the vulnerability and the specific product affected, the risk is mostly relevant to organizations still operating legacy Netopia R9100 routers, which may be found in smaller or specialized network environments. The impact is mitigated by the requirement for authenticated access, limiting remote exploitation opportunities. Nonetheless, in critical infrastructure or sensitive environments, unauthorized configuration changes could facilitate further attacks or data exfiltration.

Mitigation Recommendations

1. Apply the vendor-provided patch immediately to affected Netopia R9100 routers (version 4.6.2) to ensure proper enforcement of SNMP table modification restrictions. 2. Restrict SNMP access strictly to trusted administrators and management systems using network segmentation and access control lists (ACLs). 3. Implement strong authentication mechanisms for router management interfaces to reduce the risk of unauthorized access. 4. Regularly audit SNMP configurations and router logs to detect unauthorized changes or suspicious activity. 5. Consider replacing legacy Netopia R9100 routers with modern, supported devices that have up-to-date security features and firmware. 6. Employ network monitoring tools that can detect anomalous SNMP traffic or configuration changes in real-time. 7. Limit the number of users with authenticated access to network devices to the minimum necessary and enforce role-based access controls.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7dfafd

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 7:03:19 PM

Last updated: 2/7/2026, 3:34:52 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats