2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-34840" ,
"sourceIdentifier" : "vultures@jpcert.or.jp" ,
"published" : "2022-12-07T10:15:10.303" ,
"lastModified" : "2022-12-13T01:51:47.280" ,
"vulnStatus" : "Analyzed" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Use of hard-coded credentials vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to alter?configuration settings of the device. The affected products/versions are as follows: WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, and WZR-D1100H firmware Ver. 2.00 and earlier."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de uso de credenciales codificadas en m\u00faltiples dispositivos de red de Buffalo permite que un atacante adyacente a la red altere los ajustes de configuraci\u00f3n del dispositivo. Los productos/versiones afectados son los siguientes: WZR-300HP firmware Ver. 2.00 y anteriores, versi\u00f3n del firmware WZR-450HP. 2.00 y anteriores, versi\u00f3n del firmware WZR-600DHP. 2.00 y anteriores, versi\u00f3n del firmware WZR-900DHP. 1.15 y anteriores, versi\u00f3n del firmware HW-450HP-ZWE. 2.00 y anteriores, versi\u00f3n del firmware WZR-450HP-CWT. 2.00 y anteriores, versi\u00f3n del firmware WZR-450HP-UB. 2.00 y anteriores, versi\u00f3n del firmware WZR-600DHP2. 1.15 y anteriores, y la versi\u00f3n del firmware WZR-D1100H. 2.00 y antes."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-798"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-300hp_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.00" ,
"matchCriteriaId" : "987542D2-0324-4EAC-B286-8890DEC17054"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-300hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80FFBDA4-E1A4-46CC-8EE0-6C92CB5C0A03"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-450hp_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.00" ,
"matchCriteriaId" : "D05D42D1-9A42-4C9B-9EE2-26A2470C3548"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-450hp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6014747F-30BA-4C65-8340-CA16C886A45B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-600dhp_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.00" ,
"matchCriteriaId" : "BE46751B-8FA3-4D8C-AC9D-F5E8025565B8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-600dhp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06AF9040-7F63-4E80-82DD-7448320BC940"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-900dhp_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.15" ,
"matchCriteriaId" : "F3669EA6-95FC-4C23-9B48-6FD85011125F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-900dhp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8BD47F3-29D0-4B34-A346-C0042FBD75ED"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:hw-450hp-zwe_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.00" ,
"matchCriteriaId" : "E9623821-D3F8-46C3-8B85-CBD86B8BC1D9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:hw-450hp-zwe:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54BE2F24-8A3F-426F-B935-62F82F83E457"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-450hp-cwt_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.00" ,
"matchCriteriaId" : "203244A3-B02D-4E16-A2C9-DE7BB015A299"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-450hp-cwt:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "348D05E5-E619-4AE9-8A62-DF214899DB17"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-450hp-ub_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.00" ,
"matchCriteriaId" : "891A733D-5D0C-4B2C-A8AF-5DDE7D6EC83F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-450hp-ub:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5923DA5-CF09-408D-BE0D-A878EFB8BB6B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-600dhp2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.15" ,
"matchCriteriaId" : "5C50F463-0017-4C5F-95CB-D5927ED52346"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-600dhp2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9271B665-2267-4C24-92FD-B1CBCB2F0F59"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wzr-d1100h_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.00" ,
"matchCriteriaId" : "7DE80A3F-C286-46F6-A318-D0D3E0216B5E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wzr-d1100h:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79BB1A7E-19AD-4897-B20F-03BDA7DCFA8C"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://jvn.jp/en/vu/JVNVU92805279/index.html" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.buffalo.jp/news/detail/20221003-01.html" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
}
]
}