Skip to main content

CVE-2020-23587: n/a in n/a

Low
VulnerabilityCVE-2020-23587cvecve-2020-23587n-acwe-352
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to men in the middle attack by adding New Routes in RoutingConfiguration on " /routing.asp ".

AI-Powered Analysis

AILast updated: 06/24/2025, 17:05:44 UTC

Technical Analysis

CVE-2020-23587 is a security vulnerability identified in the OPTILINK OP-XT71000N device, specifically affecting Hardware Version V2.2 and Firmware Version OP_V3.3.1-191028. The vulnerability allows an unauthenticated remote attacker to perform a Cross-Site Request Forgery (CSRF) attack targeting the device's routing configuration interface accessible via the "/routing.asp" endpoint. By exploiting this vulnerability, an attacker can add new routes to the device's routing table without requiring authentication. This manipulation can facilitate man-in-the-middle (MitM) attacks by redirecting network traffic through attacker-controlled paths. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery), indicating that the device lacks proper anti-CSRF protections on critical configuration pages. The CVSS v3.1 base score is 3.1, reflecting a low severity primarily due to the requirement of user interaction (UI:R) and high attack complexity (AC:H). The attack vector is network-based (AV:N), and no privileges are required (PR:N), but the attacker must trick a legitimate user into initiating the malicious request. The vulnerability impacts the integrity of the device’s routing configuration but does not directly affect confidentiality or availability. No known exploits have been reported in the wild, and no patches or vendor advisories are currently available. Given the device type (a network hardware router), successful exploitation could enable traffic interception, potentially compromising sensitive communications within affected networks.

Potential Impact

For European organizations, the impact of this vulnerability could be significant in environments where OPTILINK OP-XT71000N devices are deployed, particularly in small to medium enterprises or branch offices relying on this hardware for routing. The ability to inject unauthorized routes can lead to man-in-the-middle attacks, enabling attackers to intercept, modify, or redirect network traffic. This undermines the integrity of communications and could facilitate further attacks such as credential theft, data exfiltration, or lateral movement within the network. Although the CVSS score is low, the real-world impact depends on the deployment context and user behavior since exploitation requires user interaction. Critical infrastructure or organizations handling sensitive data could face increased risk if attackers leverage this vulnerability to compromise network traffic. However, the absence of known exploits and the requirement for user interaction reduce the immediacy of the threat. Nonetheless, organizations should assess their network topology and device inventory to identify any affected hardware and evaluate exposure, especially where remote management interfaces are accessible.

Mitigation Recommendations

1. Network Segmentation: Isolate OPTILINK OP-XT71000N devices from direct internet exposure and restrict access to management interfaces to trusted internal networks only. 2. User Awareness: Educate users about the risks of unsolicited links or requests that could trigger CSRF attacks, emphasizing caution when interacting with device management portals. 3. Access Controls: Implement strict access control lists (ACLs) and firewall rules to limit access to the "/routing.asp" interface to authorized personnel only. 4. Monitoring and Logging: Enable detailed logging on the device and network perimeter to detect unusual routing changes or configuration modifications. 5. Firmware Updates: Regularly check for firmware updates or vendor advisories addressing this vulnerability and apply patches promptly once available. 6. Use of Web Application Firewalls (WAF): Deploy WAFs capable of detecting and blocking CSRF attack patterns targeting device management interfaces. 7. Disable Unnecessary Services: If possible, disable remote management features or restrict them to secure channels such as VPNs to reduce attack surface. 8. Incident Response Preparedness: Develop procedures to quickly respond to suspected routing configuration tampering, including route validation and device resets.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-08-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefbb2

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 5:05:44 PM

Last updated: 8/1/2025, 7:17:16 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats