[Japanese]

JVNDB-2019-000044

The management console of iDoors Reader vulnerable to authentication bypass

Overview

The management console of iDoors Reader provided by A.T.WORKS, Inc. contains an authentication bypass vulnerability (CWE-288).

Yusuke Nakano of Secure Cycle Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 8.8 (High) [IPA Score]
  • Attack Vector: Adjacent Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 5.8 (Medium) [IPA Score]
  • Access Vector: Adjacent Network
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
Affected Products


A.T.WORKS, Inc.
  • iDoors Reader 2.10.17 and earlier

According to the developer, the management console of iDoors Cloud is not affected by this vulnerability.
Impact

An attacker in the same segment may access the management console and operate the product.
Solution

[Update the Firmware]
Apply the firmware update according to the information provided by the developer.
Vendor Information

A.T.WORKS, Inc.
CWE (What is CWE?)

  1. Permissions(CWE-264) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2019-5964
References

  1. JVN : JVN#28218613
Revision History

  • [2019/07/01]
      Web page was published