[Japanese]

JVNDB-2022-000056

Multiple vulnerabilities in Nintendo Wi-Fi Network Adaptor WAP-001

Overview

Nintendo Wi-Fi Network Adaptor provided by Nintendo Co.,Ltd. contains multiple vulnerabilities listed below.
* OS command injection (CWE-78) - CVE-2022-36381
* Buffer overflow (CWE-121) - CVE-2022-36293

Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 6.8 (Medium) [IPA Score]
  • Attack Vector: Adjacent Network
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 5.2 (Medium) [IPA Score]
  • Access Vector: Adjacent Network
  • Access Complexity: Low
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2022-36381


CVSS V3 Severity:
Base Metrics 6.8 (Medium) [IPA Score]
  • Attack Vector: Adjacent Network
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 5.2 (Medium) [IPA Score]
  • Access Vector: Adjacent Network
  • Access Complexity: Low
  • Authentication: Single
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2022-36293
Affected Products


Nintendo Co., Ltd
  • Nintendo Wi-Fi Network Adptor WAP-001 all versions

Impact

  • A user who can access the administrative page of the product may execute an arbitrary OS command - CVE-2022-36381
  • A user who can access the administrative page of the product may execute an arbitrary code - CVE-2022-36293
Solution

[Stop using the product]
The developer states that the product is no longer supported, therefore recommends users to stop using the product.
Vendor Information

Nintendo Co., Ltd
CWE (What is CWE?)

  1. Buffer Errors(CWE-119) [IPA Evaluation]
  2. OS Command Injection(CWE-78) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2022-36381
  2. CVE-2022-36293
References

  1. JVN : JVN#17625382
  2. National Vulnerability Database (NVD) : CVE-2022-36381
  3. National Vulnerability Database (NVD) : CVE-2022-36293
Revision History

  • [2022/07/29]
      Web page was published
  • [2024/06/14]
      References : Contents were added