[Japanese]

JVNDB-2023-000036

API server of TONE Family vulnerable to authentication bypass using an alternate path

Overview

API server of TONE Family provided by DREAM TRAIN INTERNET INC. contains an authentication bypass vulnerability using an alternate path (CWE-288).

Kodai Karakawa reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.3 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: None
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None
This vulnerability exists in API server. This CVSS base score is analyzed as the severity of attacks against API server.
Affected Products


DREAM TRAIN INTERNET INC.
  • TONE FAMILY

Impact

A remote unauthenticated attacker may login to the management console of the affected service by using E-mail address required when logging into its service. As a result, sensitive information may be viewed and/or configuration settings of the device may be altered with the user privilege.
Solution

The vulnerability was fixed by the developer on November 2nd, 2022. Users are not required to take any further actions because the fix for this vulnerability was made on the server-side.
Vendor Information

DREAM TRAIN INTERNET INC.
CWE (What is CWE?)

  1. Improper Authentication(CWE-287) [IPA Evaluation]
CVE (What is CVE?)

References

  1. JVN : JVN#14492006
Revision History

  • [2023/04/17]
      Web page was published