2024-08-01 04:03:13 +00:00
{
"id" : "CVE-2024-40883" ,
"sourceIdentifier" : "vultures@jpcert.or.jp" ,
"published" : "2024-08-01T02:15:02.023" ,
2024-11-26 13:09:44 +00:00
"lastModified" : "2024-11-26T09:15:06.443" ,
2024-09-26 06:03:17 +00:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2024-08-01 04:03:13 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site request forgery vulnerability exists in ELECOM wireless LAN routers. Viewing a malicious page while logging in to the affected product with an administrative privilege, the user may be directed to perform unintended operations such as changing the login ID, login password, etc."
2024-08-01 14:03:18 +00:00
} ,
{
"lang" : "es" ,
"value" : " Existe una vulnerabilidad de Cross-site request forgery en los enrutadores LAN inal\u00e1mbricos ELECOM. Al ver una p\u00e1gina maliciosa mientras inicia sesi\u00f3n en el producto afectado con un privilegio administrativo, se puede dirigir al usuario a realizar operaciones no deseadas, como cambiar el ID de inicio de sesi\u00f3n, la contrase\u00f1a de inicio de sesi\u00f3n, etc."
2024-08-01 04:03:13 +00:00
}
] ,
2024-08-23 18:03:15 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
2024-11-26 13:09:44 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2024-08-23 18:03:15 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-26 13:09:44 +00:00
"availabilityImpact" : "HIGH"
2024-08-23 18:03:15 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2024-10-28 03:03:22 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" ,
2024-11-26 13:09:44 +00:00
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2024-10-28 03:03:22 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
2024-11-26 13:09:44 +00:00
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV30" : [
{
"source" : "vultures@jpcert.or.jp" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" ,
2024-10-28 03:03:22 +00:00
"baseScore" : 6.5 ,
2024-11-26 13:09:44 +00:00
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE"
2024-10-28 03:03:22 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
2024-08-23 18:03:15 +00:00
}
]
} ,
"weaknesses" : [
{
2024-11-26 13:09:44 +00:00
"source" : "vultures@jpcert.or.jp" ,
"type" : "Secondary" ,
2024-08-23 18:03:15 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-352"
}
]
2024-09-26 06:03:17 +00:00
} ,
{
2024-11-26 13:09:44 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-09-26 06:03:17 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-352"
}
]
2024-08-23 18:03:15 +00:00
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.69" ,
"matchCriteriaId" : "62F4C8BB-6DA7-4227-BDE9-3113CEFA110A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D9FF3CB7-7F2E-472A-A2A3-ED599F4FC99C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.69" ,
"matchCriteriaId" : "77A56640-4A80-4338-9BBF-901088D26193"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ECD9F0FE-1232-4C39-AA86-2D616E4D39C6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:elecom:wrc-2533gs2v-b_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.69" ,
"matchCriteriaId" : "3892264D-1108-432F-83EA-E027A6AA0610"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:elecom:wrc-2533gs2v-b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69FF2911-A946-4E48-B50A-F1F5EC95BBCC"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:elecom:wrc-x6000xs-g_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.12" ,
"matchCriteriaId" : "A1309B92-8C27-488A-8190-A164502EE615"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:elecom:wrc-x6000xs-g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D50F2091-30D4-4A3E-A28A-B9D67D70DB2C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.12" ,
"matchCriteriaId" : "C34B5CB1-4483-49B0-B281-1F61045785C7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:elecom:wrc-x1500gs-b:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2B13224-1E88-4415-8B8E-979D00BD68F2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.12" ,
"matchCriteriaId" : "82A4CAE8-0C68-4881-92F3-6BFFD72A58CA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:elecom:wrc-x1500gsa-b:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D198866F-7CB3-4EA0-86EA-345CF65E116F"
}
]
}
]
}
] ,
2024-08-01 04:03:13 +00:00
"references" : [
{
"url" : "https://jvn.jp/en/jp/JVN06672778/" ,
2024-08-23 18:03:15 +00:00
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Third Party Advisory"
]
2024-08-01 04:03:13 +00:00
} ,
{
"url" : "https://www.elecom.co.jp/news/security/20240730-01/" ,
2024-08-23 18:03:15 +00:00
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Vendor Advisory"
]
2024-08-01 04:03:13 +00:00
}
]
}