Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2020-23587: n/a in n/a

0
Low
VulnerabilityCVE-2020-23587cvecve-2020-23587n-acwe-352
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to men in the middle attack by adding New Routes in RoutingConfiguration on " /routing.asp ".

AI-Powered Analysis

AILast updated: 06/24/2025, 17:05:44 UTC

Technical Analysis

CVE-2020-23587 is a security vulnerability identified in the OPTILINK OP-XT71000N device, specifically affecting Hardware Version V2.2 and Firmware Version OP_V3.3.1-191028. The vulnerability allows an unauthenticated remote attacker to perform a Cross-Site Request Forgery (CSRF) attack targeting the device's routing configuration interface accessible via the "/routing.asp" endpoint. By exploiting this vulnerability, an attacker can add new routes to the device's routing table without requiring authentication. This manipulation can facilitate man-in-the-middle (MitM) attacks by redirecting network traffic through attacker-controlled paths. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery), indicating that the device lacks proper anti-CSRF protections on critical configuration pages. The CVSS v3.1 base score is 3.1, reflecting a low severity primarily due to the requirement of user interaction (UI:R) and high attack complexity (AC:H). The attack vector is network-based (AV:N), and no privileges are required (PR:N), but the attacker must trick a legitimate user into initiating the malicious request. The vulnerability impacts the integrity of the device’s routing configuration but does not directly affect confidentiality or availability. No known exploits have been reported in the wild, and no patches or vendor advisories are currently available. Given the device type (a network hardware router), successful exploitation could enable traffic interception, potentially compromising sensitive communications within affected networks.

Potential Impact

For European organizations, the impact of this vulnerability could be significant in environments where OPTILINK OP-XT71000N devices are deployed, particularly in small to medium enterprises or branch offices relying on this hardware for routing. The ability to inject unauthorized routes can lead to man-in-the-middle attacks, enabling attackers to intercept, modify, or redirect network traffic. This undermines the integrity of communications and could facilitate further attacks such as credential theft, data exfiltration, or lateral movement within the network. Although the CVSS score is low, the real-world impact depends on the deployment context and user behavior since exploitation requires user interaction. Critical infrastructure or organizations handling sensitive data could face increased risk if attackers leverage this vulnerability to compromise network traffic. However, the absence of known exploits and the requirement for user interaction reduce the immediacy of the threat. Nonetheless, organizations should assess their network topology and device inventory to identify any affected hardware and evaluate exposure, especially where remote management interfaces are accessible.

Mitigation Recommendations

1. Network Segmentation: Isolate OPTILINK OP-XT71000N devices from direct internet exposure and restrict access to management interfaces to trusted internal networks only. 2. User Awareness: Educate users about the risks of unsolicited links or requests that could trigger CSRF attacks, emphasizing caution when interacting with device management portals. 3. Access Controls: Implement strict access control lists (ACLs) and firewall rules to limit access to the "/routing.asp" interface to authorized personnel only. 4. Monitoring and Logging: Enable detailed logging on the device and network perimeter to detect unusual routing changes or configuration modifications. 5. Firmware Updates: Regularly check for firmware updates or vendor advisories addressing this vulnerability and apply patches promptly once available. 6. Use of Web Application Firewalls (WAF): Deploy WAFs capable of detecting and blocking CSRF attack patterns targeting device management interfaces. 7. Disable Unnecessary Services: If possible, disable remote management features or restrict them to secure channels such as VPNs to reduce attack surface. 8. Incident Response Preparedness: Develop procedures to quickly respond to suspected routing configuration tampering, including route validation and device resets.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-08-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefbb2

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 5:05:44 PM

Last updated: 2/7/2026, 12:23:04 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats