[Japanese]

JVNDB-2017-000044

CentreCOM AR260S V2 vulnerable to privilege escalation

Overview

CentreCOM AR260S V2 provided by Allied Telesis K.K. is a wired LAN router. CentreCOM AR260S V2 contains a privilege escalation vulnerability.

Ziv Chang of Trend Micro Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 5.2 (Medium) [IPA Score]
  • Access Vector: Adjacent Network
  • Access Complexity: Low
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial

CVSS V3 Severity:
Base Metrics: 8.0 (High) [IPA Score]
  • Access Vector: Adjacent
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products


Allied Telesis
  • CentreCOM AR260S V2

Impact

Unintended operations may be performed with administrative privileges by a user who can log into the produt with "guest" account.
Solution

[Apply Workarounds]
The following workarounds may mitigate the impacts of this vulnerability.

* Change the password of the account "guest"
The default password of the account "guest" is publicly known. Change the password of the account "guest" immediately to prevent an unauthenticated attacker from logging into the product.

* Do not allow untrusted person to use the account "guest"
Once logged into the vulnerable product as "guest", this vulnerability can be exploited. Therefore do not allow untrusted person to use the "guest" account.

* Enable the Firewall protection
The product has a firewall protection, and it is enabled by default. Enable firewall to protect the product from unintended accesses from WAN side.
Vendor Information

Allied Telesis
CWE (What is CWE?)

  1. Permissions(CWE-264) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2017-2125
References

  1. JVN : JVN#55121369
Revision History

[2017/03/30]
  Web page was published