Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title Securifi Almond routers contains multiple vulnerabilities
Name VU#906576 First vendor Publication 2015-09-10
Vendor VU-CERT Last vendor Modification 2015-09-15
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:P/I:P/A:C)
Cvss Base Score 7.3 Attack Range Adjacent network
Cvss Impact Score 8.5 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#906576

Securifi Almond routers contains multiple vulnerabilities

Original Release date: 10 Sep 2015 | Last revised: 15 Sep 2015


Securifi Almond, firmware version AL1-R200-L302-W33 and earlier, and Securifi Almond 2015, firmware version AL2-R088 and earlier, contain multiple vulnerabilities.


CWE-330: Use of Insufficiently Random Values - CVE-2015-2914

Securifi Almond and Almond 2015 use static source ports for all DNS queries originating from the local area network (LAN). Additionally, DNS queries originating from the Almond itself, such as those to resolve the name of the firmware update server, use predictable TXIDs that start at 0x0002 and increase incrementally. An attacker with the ability to spoof DNS responses can cause Almond LAN clients to contact incorrect or malicious hosts under the attacker's control.

CWE-319: Cleartext Transmission of Sensitive Information

Securifi uses HTTP by default for checking and transmitting firmware update information to Almond products. An attacker capable of conducting man-in-the-middle attacks can manipulate traffic to block updates or inject arbitrary files.

Note that as of August 24, 2015, Securifi has changed its firmware upgrade servers to use HTTPS.

CWE-255: Credentials Management - CVE-2015-2915

Securifi Almond uses a default password of admin for the admin account. A local area network attacker can gain privileged access to the web management interface or leverage default credentials in remote attacks such as cross-site request forgery.

CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2015-2916

Securifi Almond and Almond 2015 contain a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. Note that in combination with default credentials, an attacker can establish an active session as part of an attack and therefore would not require a victim to be logged in.

CWE-20: Improper Input Validation - CVE-2015-2917

The Securifi Almond and Almond 2015 web management interfaces do not enforce the same-origin policy in X-Frame-Options response headers. An attacker can conduct clickjacking attacks via a specially crafted web page.

The CVSS score below applies to CVE-2015-2916.


A remote, unauthenticated attacker may be able to spoof DNS responses to cause Almond LAN clients to contact attacker-controlled hosts or induce an authenticated user into making an unintentional request to the web server that will be treated as an authentic request.


Apply an update

Securifi has released firmware versions to address these vulnerabilities. Almond users should upgrade to AL1-R201EXP10-L304-W34 or later. Almond 2015 users should upgrade to AL2-R088M or later.

Note that the firmware updates mitigate the CSRF and clickjacking vulnerabilities by disabling the web management interface. Users may still enable web management from the Almond touch screen controls, but doing so will render their devices vulnerable. The CERT/CC is currently unaware of a practical solution to this problem and recommends the following workaround.

Limit usage of web management

Users should disable the web management interface if there is no immediate need to use it. When disabling the interface is not an option, users should implement strong password protection, and never leave the web management interface open and logged in while browsing other web sites.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
SecurifiAffected09 Jul 201524 Aug 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)



  • http://www.securifi.com/almond
  • https://firmware.securifi.com/AL1/AL1-R201EXP10-L304-W34
  • https://firmware.securifi.com/AL2/AL2-R088m
  • https://cwe.mitre.org/data/definitions/330.html
  • https://cwe.mitre.org/data/definitions/319.html
  • https://cwe.mitre.org/data/definitions/255.html
  • https://cwe.mitre.org/data/definitions/352.html
  • https://cwe.mitre.org/data/definitions/20.html


These vulnerabilities were reported by Joel Land of the CERT/CC.

This document was written by Joel Land.

Other Information

  • CVE IDs:CVE-2015-2914CVE-2015-2915CVE-2015-2916CVE-2015-2917
  • Date Public:10 Sep 2015
  • Date First Published:10 Sep 2015
  • Date Last Updated:15 Sep 2015
  • Document Revision:30


If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/906576

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
33 % CWE-255 Credentials Management
33 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

Os 2
Os 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2015-09-22 00:26:43
  • Multiple Updates
2015-09-21 21:22:56
  • Multiple Updates
2015-09-21 17:24:34
  • Multiple Updates
2015-09-15 17:21:10
  • Multiple Updates
2015-09-10 21:24:05
  • First insertion