[Japanese]
|
JVNDB-2022-000056
|
Multiple vulnerabilities in Nintendo Wi-Fi Network Adaptor WAP-001
|
Nintendo Wi-Fi Network Adaptor provided by Nintendo Co.,Ltd. contains multiple vulnerabilities listed below.
* OS command injection (CWE-78) - CVE-2022-36381
* Buffer overflow (CWE-121) - CVE-2022-36293
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 6.8 (Medium) [IPA Score]
- Attack Vector: Adjacent Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVSS V2 Severity: Base Metrics 5.2 (Medium) [IPA Score]
- Access Vector: Adjacent Network
- Access Complexity: Low
- Authentication: Single Instance
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2022-36381
|
CVSS V3 Severity:
Base Metrics
6.8 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: High
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
CVSS V2 Severity:Base Metrics
5.2 (Medium)
[IPA Score]
-
Access Vector: Adjacent Network
-
Access Complexity: Low
-
Authentication: Single
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2022-36293
|
|
Nintendo Co., Ltd
- Nintendo Wi-Fi Network Adptor WAP-001 all versions
|
|
- A user who can access the administrative page of the product may execute an arbitrary OS command - CVE-2022-36381
- A user who can access the administrative page of the product may execute an arbitrary code - CVE-2022-36293
|
[Stop using the product]
The developer states that the product is no longer supported, therefore recommends users to stop using the product.
|
Nintendo Co., Ltd
|
- Buffer Errors(CWE-119) [IPA Evaluation]
- OS Command Injection(CWE-78) [IPA Evaluation]
|
- CVE-2022-36381
- CVE-2022-36293
|
- JVN : JVN#17625382
- National Vulnerability Database (NVD) : CVE-2022-36381
- National Vulnerability Database (NVD) : CVE-2022-36293
|
- [2022/07/29]
Web page was published
- [2024/06/14]
References : Contents were added
|