2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-43486" ,
"sourceIdentifier" : "vultures@jpcert.or.jp" ,
"published" : "2022-12-19T03:15:10.633" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:26:35.120" ,
2024-02-14 17:08:46 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2024-02-14 17:08:46 +00:00
"value" : "Hidden functionality vulnerability in Buffalo network devices allows a network-adjacent attacker with an administrative privilege to enable the debug functionalities and execute an arbitrary command on the affected devices."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de funcionalidad oculta en dispositivos de red Buffalo WSR-3200AX4S firmware Ver. 1.26 y anteriores, versi\u00f3n del firmware WSR-3200AX4B. 1.25, versi\u00f3n del firmware WSR-2533DHP. 1.08 y anteriores, versi\u00f3n del firmware WSR-2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-A2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-A2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-2533DHPL. 1.08 y anteriores, versi\u00f3n del firmware WSR-2533DHPL2. 1.03 y anteriores, versi\u00f3n del firmware WSR-2533DHPLS. 1.07 y anteriores, versi\u00f3n del firmware WCR-1166DS. 1.34 y anteriores, versi\u00f3n del firmware WEX-1800AX4. 1.13 y anteriores, y la versi\u00f3n del firmware WEX-1800AX4EA. 1.13 y versiones anteriores permiten que un atacante adyacente a la red con privilegios administrativos habilite las funcionalidades de depuraci\u00f3n y ejecute un comando arbitrario en el dispositivo afectado."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.8 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 0.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-3200ax4s_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.26" ,
"matchCriteriaId" : "07164878-06B0-49DB-88D9-C149D72E67C4"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-3200ax4s:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE5277EC-9BD1-40C3-B1B9-C67A1C45645C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-3200ax4b_firmware:1.25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "30621C77-BB74-4862-A145-02113D009BF7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-3200ax4b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BC6F897-46FE-4629-80EC-2740FBA080FF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-2533dhp2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.22" ,
"matchCriteriaId" : "0A8060FF-BC01-493F-8C6A-367B6532CED1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-2533dhp2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08F476D3-8329-44B1-A2B0-B2AEB500863F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-a2533dhp2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.22" ,
"matchCriteriaId" : "9EA7A67F-30F3-422E-9070-A2EA6353457E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-a2533dhp2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BF474D3-21B8-47D5-BC18-443295C51638"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-2533dhp3_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.26" ,
"matchCriteriaId" : "C1259443-53C8-4787-B427-81FD177E68A1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-2533dhp3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE0A99BA-2724-4F68-94F7-8825A0588E6F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-a2533dhp3_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.26" ,
"matchCriteriaId" : "70BDFC2C-E148-4485-B2E6-33CA2276F751"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-a2533dhp3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B82FF3D2-7ACF-4121-AF92-4A0714EB0C7F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-2533dhpl2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.03" ,
"matchCriteriaId" : "093EA797-1F83-4FAA-935E-31F8C9986857"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-2533dhpl2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "31E5BEB1-FCA6-49E9-A244-7AE3DDF83373"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-2533dhpls_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.07" ,
"matchCriteriaId" : "387619C1-3F85-43DC-A4B1-FF24E2AD8382"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-2533dhpls:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "310ACFB8-13EE-4A72-A9A0-3BFDAFF1ED1A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wex-1800ax4_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.13" ,
"matchCriteriaId" : "34FE69C5-AC26-4839-9495-3D6F9E34C20B"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wex-1800ax4:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "751FA556-DDEC-4A69-A6F7-4959FAF6A5C8"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wex-1800ax4ea_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.13" ,
"matchCriteriaId" : "C04C137D-C6A9-4FC6-AEF0-5F42E16B46E8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wex-1800ax4ea:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "81507AF7-B640-4695-A095-20ADFD197C66"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-2533dhp_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.08" ,
"matchCriteriaId" : "366FE02C-D030-4D36-B9C4-167A58D38174"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-2533dhp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1574DB7C-A19C-45B5-AD37-4C0AFE8CC798"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wsr-2533dhpl_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.08" ,
"matchCriteriaId" : "14367351-45B7-460E-80C2-D72609245466"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wsr-2533dhpl:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C23EE312-9ADE-4B0B-B7ED-F61AC441E5DB"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:buffalo:wcr-1166ds_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.34" ,
"matchCriteriaId" : "EE85F7D6-76DB-47C6-BB61-1572B53E8D48"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:buffalo:wcr-1166ds:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F5537A90-A060-4CB4-8912-D7994AE75196"
}
]
}
]
}
] ,
"references" : [
{
2024-02-14 17:08:46 +00:00
"url" : "https://jvn.jp/en/vu/JVNVU97099584/" ,
"source" : "vultures@jpcert.or.jp"
2023-04-24 12:24:31 +02:00
} ,
{
2024-02-14 17:08:46 +00:00
"url" : "https://www.buffalo.jp/news/detail/20240131-01.html" ,
"source" : "vultures@jpcert.or.jp"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://jvn.jp/en/vu/JVNVU97099584/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.buffalo.jp/news/detail/20240131-01.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}