2023-08-23 14:00:33 +00:00

24 lines
842 B
JSON

{
"id": "CVE-2023-40282",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-23T04:15:12.417",
"lastModified": "2023-08-23T13:17:18.197",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPPORTED WHEN ASSIGNED ** Improper authentication vulnerability in Rakuten WiFi Pocket all versions allows a network-adjacent attacker to log in to the product's Management Screen. As a result, sensitive information may be obtained and/or the settings may be changed."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN55217369/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://network.mobile.rakuten.co.jp/product/internet/rakuten-wifi-pocket/support/",
"source": "vultures@jpcert.or.jp"
}
]
}