BUFFALO LinkStation 200 series vulnerable to arbitrary code execution


LinkStation 200 series provided by BUFFALO INC. is a network attached storage (NAS).
LinkStation 200 series contains an arbitrary code execution vulnerability (CWE-354, CVE-2023-51073) due to insufficient verification of data authenticity during firmware update.

BUFFALO INC. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.3 (Medium) [Other]
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: High
  • Availability Impact: None
Affected Products

  • LS210D firmware Ver. 1.08 and earlier
  • LS220D firmware Ver. 1.08 and earlier
  • LS220DB firmware Ver. 1.08 and earlier
  • LS220DR firmware Ver. 1.08 and earlier

A wide range of products are affected. For the details, refer to the information provided by the developer.

A remote attacker may execute an arbitrary code with the root privilege via man-in-the-middle attack.

The analysis evaluates "Integrity Impact(I)" as the primary impact, where the affected product is tricked to download the crafted firmware data to execute.

[Update the Firmware]
Update the firmware to the latest version according to the information provided by the developer.
Vendor Information

CWE (What is CWE?)

  1. Improper Validation of Integrity Check Value(CWE-354) [Other]
CVE (What is CVE?)

  1. CVE-2023-51073

  1. JVN : JVNVU#90953541
  2. National Vulnerability Database (NVD) : CVE-2023-51073
  3. Related document : github.com (CVE-2023-51073)
  4. Related document : www.buffalotech.com
Revision History

  • [2024/03/25]
      Web page was published