DrayTek UK Users' Community Forum
Help, Advice and Solutions from DrayTek Users
Vigor 2860 vulnerability detected
- psionuk
- Topic Author
- Offline
- New Member
Less
More
- Posts: 2
- Thank yous received: 0
25 Jan 2016 11:16 #85169
by psionuk
Vigor 2860 vulnerability detected was created by psionuk
Hi,
I have a client who has regular security scans done by their bank/credit card processor. Since upgrading their router to a newer model (Vigor2860n 3.8.2_VT2) they are getting a vulnerability error.
"Predictable TCP Initial Sequence Numbers Vulnerability -
THREAT:
This server uses TCP/IP implementation that respects the "64K rule", or a "time dependent rule" for generating TCP sequence numbers. Unauthorized users can predict
sequence numbers when two hosts are communicating, and connect to your server from any source IP address. The only difference with a legitimate connection is that
the attacker will not see the replies sent back to the authorized user whose IP was forged."
Any ideas on this issue?
I have a client who has regular security scans done by their bank/credit card processor. Since upgrading their router to a newer model (Vigor2860n 3.8.2_VT2) they are getting a vulnerability error.
"Predictable TCP Initial Sequence Numbers Vulnerability -
THREAT:
This server uses TCP/IP implementation that respects the "64K rule", or a "time dependent rule" for generating TCP sequence numbers. Unauthorized users can predict
sequence numbers when two hosts are communicating, and connect to your server from any source IP address. The only difference with a legitimate connection is that
the attacker will not see the replies sent back to the authorized user whose IP was forged."
Any ideas on this issue?
Please Log in or Create an account to join the conversation.
- haywardi
- Offline
- Member
Less
More
- Posts: 187
- Thank yous received: 0
06 Feb 2016 15:28 #85292
by haywardi
Iain
Replied by haywardi on topic Re: Vigor 2860 vulnerability detected
Yes, just had the same thing on a 2850.
It looks to me to be a bug in the latest firmware, I downgraded my firmware to 3.6.6.1 and no more Predictable TCP initial sequence numbers and I now have compliance!
Iain
It looks to me to be a bug in the latest firmware, I downgraded my firmware to 3.6.6.1 and no more Predictable TCP initial sequence numbers and I now have compliance!
Iain
Iain
Please Log in or Create an account to join the conversation.
Moderators: Chris
Copyright © 2025 DrayTek