| [Japanese] | 
| JVNDB-2016-000061 | 
| WN-GDN/R3 Series does not limit authentication attempts | 
|
| 
 
WN-GDN/R3 Series provided by I-O DATA DEVICE, INC. does not limit authentication attempts.
 WN-GDN/R3 series provided by I-O DATA DEVICE, INC. is a wireless LAN router. WPS functionality in WN-GDN/R3 Series does not limit PIN authentication attempts, making it susceptible to brute force attacks.
 
 Takeshi Okamoto of Kanagawa Institute of Technology and Takaaki Minegishi reported this vulnerability to IPA.
 JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 4.3 (Medium) [IPA Score]
 
    Attack Vector: Adjacent NetworkAttack Complexity: LowPrivileges Required: NoneUser Interaction: NoneScope: UnchangedConfidentiality Impact: LowIntegrity Impact: NoneAvailability Impact: None 
  CVSS V2 Severity:Base Metrics 3.3 (Low) [IPA Score]
 
    Access Vector: Adjacent NetworkAccess Complexity: LowAuthentication: NoneConfidentiality Impact: PartialIntegrity Impact: NoneAvailability Impact: None 
  
 | 
|
| 
 
	
 | 
| 
 
	I-O DATA DEVICE, INC.
	
		WN-GDN/R3 WN-GDN/R3-C WN-GDN/R3-S WN-GDN/R3-U  | 
| 
 
	
 | 
|
| 
 
An unauthenticated attacker within wireless range of the device may perform a brute force attack to recover the PIN. Using the recovered PIN, the attacker may gain access to the network.
 | 
|
| 
 
[Apply a Workaround]The following workaround will mitigate this vulnerability.
 
 * Disable the WPS functionality
 | 
|
| 
 
	I-O DATA DEVICE, INC.
	
 | 
|
| 
 
	Improper Authentication(CWE-287) [IPA Evaluation] | 
|
| 
 
	CVE-2016-1206  | 
|
| 
 
	JVN : JVN#25674893 JVN : JVNVU#723755 (in Japanese)National Vulnerability Database (NVD) : CVE-2016-1206  | 
|
| 
 
	[2016/05/12]Web page was published
 [2016/06/01]
 References : Content was added
 
 |