[Japanese]
|
JVNDB-2023-000029
|
Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210
|
SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 provided by Seiko Solutions Inc. contain multiple vulnerabilities listed below.
- Exposure of sensitive information to an unauthorized actor (CWE-200) - CVE-2016-2183
- Command injection (CWE-77) - CVE-2022-36556
- Unrestricted upload of file with dangerous type (CWE-434) - CVE-2022-36557
- Use of hard-coded credentials (CWE-798) - CVE-2022-36558
- Command injection (CWE-77) - CVE-2022-36559
- Use of hard-coded credentials (CWE-798) - CVE-2022-36560
- Improper privilege management (CWE-269) - CVE-2023-22361
- Missing authentication for critical function (CWE-306) - CVE-2023-22441
- Improper access control (CWE-284) - CVE-2023-23578
- Improper following of a certificate's chain of trust (CWE-296) - CVE-2023-23901
- Missing authentication for critical function (CWE-306) - CVE-2023-23906
- Cleartext storage of sensitive information (CWE-312) - CVE-2023-24586
- Cleartext transmission of sensitive information (CWE-319) - CVE-2023-25070
- Use of weak credentials (CWE-1391) - CVE-2023-25072
- Use of weak credentials (CWE-1391) - CVE-2023-25184
The developer states that attacks exploiting CVE-2022-36556 have been observed.
CVE-2023-22441
MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2016-2183, CVE-2022-36556, CVE-2022-36557, CVE-2022-36558, CVE-2022-36559, CVE-2022-36560, CVE-2023-22361, CVE-2023-23578, CVE-2023-23901, CVE-2023-23906, CVE-2023-24586, CVE-2023-25070, CVE-2023-25072, CVE-2023-25184
Thomas J. Knudsen and Samy Younsi of NeroTeam Security Labs reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
|
CVSS V3 Severity: Base Metrics 8.6 (High) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: High
CVSS V2 Severity: Base Metrics 9.0 (High) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2023-22441
|
CVSS V3 Severity:
Base Metrics
7.5 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
7.8 (High)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Complete
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2016-2183
|
CVSS V3 Severity:
Base Metrics
8.8 (High) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
CVSS V2 Severity:Base Metrics
6.5 (Medium)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: Single
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2022-36556
|
CVSS V3 Severity:
Base Metrics
4.3 (High) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
4.0 (Medium)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: Single
-
Confidentiality Impact: None
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2022-36557
|
CVSS V3 Severity:
Base Metrics
6.2 (High) [IPA Score]
-
Attack Vector: Local
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
2.1 (Medium)
[IPA Score]
-
Access Vector: Local
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2022-36558
|
CVSS V3 Severity:
Base Metrics
9.8 (Critical) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
CVSS V2 Severity:Base Metrics
7.5 (High)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2022-36559
|
CVSS V3 Severity:
Base Metrics
6.2 (High) [IPA Score]
-
Attack Vector: Local
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
2.1 (Medium)
[IPA Score]
-
Access Vector: Local
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2022-36560
|
CVSS V3 Severity:
Base Metrics
4.3 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
4.0 (Medium)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: Single
-
Confidentiality Impact: None
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-22361
|
CVSS V3 Severity:
Base Metrics
5.3 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
5.0 (Medium)
[IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-23578
|
CVSS V3 Severity:
Base Metrics
4.8 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
4.0 (Medium) [IPA Score]
-
Access Vector: Network
-
Access Complexity:High
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-23901
|
CVSS V3 Severity:
Base Metrics
7.5 (High) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: None
-
Availability Impact: High
CVSS V2 Severity:Base Metrics
7.8 (High) [IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: None
-
Integrity Impact: None
-
Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2023-23906
|
CVSS V3 Severity:
Base Metrics
3.1 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
3.5 (Low) [IPA Score]
-
Access Vector: Network
-
Access Complexity: Medium
-
Authentication: Single
-
Confidentiality Impact: Partial
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-24586
|
CVSS V3 Severity:
Base Metrics
4.8 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
4.0 (Medium) [IPA Score]
-
Access Vector: Network
-
Access Complexity: High
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-25070
|
CVSS V3 Severity:
Base Metrics
6.5 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
6.4 (Medium) [IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-25072
|
CVSS V3 Severity:
Base Metrics
5.3 (Medium) [IPA Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: None
-
Availability Impact: None
CVSS V2 Severity:Base Metrics
5.0 (Medium) [IPA Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-25184
|
|
|
Seiko Solutions Inc.
- SkyBridge BASIC MB-A130 firmware firmware Ver. 1.4.1 and earlier (CVE-2023-22441, CVE-2023-23901, CVE-2023-25184)
- SkyBridge MB-A100 firmware firmware Ver. 4.2.0 and earlier (CVE-2022-36556, CVE-2022-36557, CVE-2022-36558, CVE-2023-22361, CVE-2023-23906, CVE-2023-24586, CVE-2023-25070, CVE-2023-25072)
- SkyBridge MB-A110 firmware firmware Ver. 4.2.0 and earlier (CVE-2022-36556, CVE-2022-36557, CVE-2022-36558, CVE-2023-22361, CVE-2023-23906, CVE-2023-24586, CVE-2023-25070, CVE-2023-25072)
- SkyBridge MB-A200 firmware firmware Ver. 01.00.05 and earlier (CVE-2016-2183, CVE-2022-36559, CVE-2022-36560, CVE-2023-22441, CVE-2023-23578, CVE-2023-23901, CVE-2023-25184)
- SkySpider MB-R210 firmware firmware Ver. 1.01.00 and earlier (CVE-2023-25184)
|
|
A remote attacker may decrypt the communication sent to the WebUI of the product - CVE-2016-2183
A user may execute an arbitrary OS command with an administrative privilege of the product - CVE-2022-36556
A user may update files or execute an arbitrary command with an administrative privilege of the product - CVE-2022-36557
A local attacker may access to the product with an administrative privilege of the product - CVE-2022-36558, CVE-2022-36560
A remote attacker may execute an arbitrary OS command with an administrative privilege of the product - CVE-2022-36559
A user may alter a WebUI password of the product - CVE-2023-22361
A remote attacker may obtain or alter the setting information of the product or execute some critical functions without authentication, e.g., rebooting the product - CVE-2023-22441
A remote attacker may connect to the product's ADB port - CVE-2023-23578
A remote attacker may eavesdrop on or alter the communication sent to the WebUI of the product - CVE-2023-23901
A remote attacker may execute some critical functions without authentication, e.g., rebooting the product - CVE-2023-23906
A user may obtain an APN credential for the product - CVE-2023-24586
If the telnet connection is enabled, a remote attacker may eavesdrop on or alter the administrator's communication to the product - CVE-2023-25070
A remote attacker may decrypt password for the WebUI of the product - CVE-2023-25072, CVE-2023-25184
|
[Update the firmware]
Update the firmware to the latest version according to the information provided by the developer.
The developer released the following versions which contain a fix for these vulnerabilities.
- SkyBridge MB-A100/110 Ver. 4.2.2 and later
- SkyBridge MB-A200 Ver. 01.00.07 and later
- SkyBridge BASIC MB-A130 Ver. 1.4.3 and later
[Apply the workaround]
The developer recommends applying a workaround.
For more information, refer to the information provided by the developer.
|
Seiko Solutions Inc.
|
- Information Exposure(CWE-200) [IPA Evaluation]
- Permissions(CWE-264) [IPA Evaluation]
- Improper Authentication(CWE-287) [IPA Evaluation]
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2023-22361
- CVE-2023-22441
- CVE-2023-23578
- CVE-2023-23901
- CVE-2023-23906
- CVE-2023-24586
- CVE-2023-25070
- CVE-2023-25072
- CVE-2023-25184
- CVE-2016-2183
- CVE-2022-36556
- CVE-2022-36557
- CVE-2022-36558
- CVE-2022-36559
- CVE-2022-36560
|
- JVN : JVN#40604023
- National Vulnerability Database (NVD) : CVE-2016-2183
- National Vulnerability Database (NVD) : CVE-2022-36556
- National Vulnerability Database (NVD) : CVE-2022-36557
- National Vulnerability Database (NVD) : CVE-2022-36558
- National Vulnerability Database (NVD) : CVE-2022-36559
- National Vulnerability Database (NVD) : CVE-2022-36560
- National Vulnerability Database (NVD) : CVE-2023-22361
- National Vulnerability Database (NVD) : CVE-2023-22441
- National Vulnerability Database (NVD) : CVE-2023-23578
- National Vulnerability Database (NVD) : CVE-2023-23901
- National Vulnerability Database (NVD) : CVE-2023-23906
- National Vulnerability Database (NVD) : CVE-2023-24586
- National Vulnerability Database (NVD) : CVE-2023-25070
- National Vulnerability Database (NVD) : CVE-2023-25072
- National Vulnerability Database (NVD) : CVE-2023-25184
|
- [2023/03/31]
Web page was published
- [2023/09/06]
Overview was modified
- [2024/05/27]
References : Contents were added
|