[Japanese]
|
JVNDB-2024-000037
|
Multiple vulnerabilities in NEC Aterm series
|
Aterm series provided by NEC Corporation contains multiple vulnerabilities listed below.
- Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28005
- Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) - CVE-2024-28006
- Incorrect Permission Assignment for Critical Resource (CWE-732) - CVE-2024-28007
- Active Debug Code (CWE-489) - CVE-2024-28008
- Use of Weak Credentials (CWE-1391) - CVE-2024-28009, CVE-2024-28012
- Use of Hard-coded Credentials (CWE-798) - CVE-2024-28010
- Inclusion of Undocumented Features (CWE-1242) - CVE-2024-28011
- Insufficient Session Expiration (CWE-613) - CVE-2024-28013
- Buffer Overflow (CWE-120) - CVE-2024-28014
- OS Command Injection in the web management console (CWE-78) - CVE-2024-28015
- Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) - CVE-2024-28016
The following people reported the vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2024-28005, CVE-2024-28008
Ryo Kashiro, and Katsuhiko Sato, and Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University
CVE-2024-28006, CVE-2024-28007, CVE-2024-28009, CVE-2024-28010, CVE-2024-28011, CVE-2024-28012
Ryo Kashiro, and Katsuhiko Sato
CVE-2024-28013
Yudai Morii, Takaya Noma, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University
CVE-2024-28014, CVE-2024-28015, CVE-2024-28016
Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University
|
CVSS V3 Severity: Base Metrics 8.8 (High) [IPA Score]
- Attack Vector: Adjacent Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
The above CVSS base scores have been assigned for CVE-2024-28014
|
CVSS V3 Severity:
Base Metrics
8.0 (High) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
The above CVSS base scores have been assigned for CVE-2024-28005
|
CVSS V3 Severity:
Base Metrics
6.5 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-28006
|
CVSS V3 Severity:
Base Metrics
8.0 (High) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
The above CVSS base scores have been assigned for CVE-2024-28007
|
CVSS V3 Severity:
Base Metrics
8.0 (High) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: Low
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
The above CVSS base scores have been assigned for CVE-2024-28008
|
CVSS V3 Severity:
Base Metrics
6.5 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-28009, CVE-2024-28012
|
CVSS V3 Severity:
Base Metrics
6.5 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-280010
|
CVSS V3 Severity:
Base Metrics
4.3 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: None
-
Availability Impact: Low
The above CVSS base scores have been assigned for CVE-2024-280011
|
CVSS V3 Severity:
Base Metrics
4.3 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: None
-
Integrity Impact: Low
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-280013
|
CVSS V3 Severity:
Base Metrics
6.8 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: High
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
The above CVSS base scores have been assigned for CVE-2024-280015
|
CVSS V3 Severity:
Base Metrics
4.3 (Medium) [IPA Score]
-
Attack Vector: Adjacent Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: None
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2024-280016
|
All versions of following Aterm series are affected by the vulnerabilities.
|
NEC Corporation
- Aterm CR2500P
- Aterm MR01LN
- Aterm MR02LN
- Aterm W1200EX(-MS)
- Aterm W300P
- Aterm WF1200HP
- Aterm WF1200HP2
- Aterm WF300HP
- Aterm WF300HP2
- Aterm WF800HP
- Aterm WG1200HP
- Aterm WG1200HP2
- Aterm WG1200HP3
- Aterm WG1200HS
- Aterm WG1200HS2
- Aterm WG1200HS3
- Aterm WG1400HP
- Aterm WG1800HP
- Aterm WG1800HP2
- Aterm WG1800HP3
- Aterm WG1800HP4
- Aterm WG1810HP(JE)
- Aterm WG1810HP(MF)
- Aterm WG1900HP
- Aterm WG1900HP2
- Aterm WG2200HP
- Aterm WG600HP
- Aterm WM3500R
- Aterm WM3800R
- Aterm WR1200H
- Aterm WR4100N
- Aterm WR4500N
- Aterm WR6600H
- Aterm WR6650S
- Aterm WR6670S
- Aterm WR7800H
- Aterm WR7850S
- Aterm WR7870S
- Aterm WR8100N
- Aterm WR8150N
- Aterm WR8165N
- Aterm WR8166N
- Aterm WR8200N
- Aterm WR8300N
- Aterm WR8400N
- Aterm WR8500N
- Aterm WG300HP
- Aterm WM3400RN
- Aterm WM3450RN
- Aterm WM3600R
- Aterm WR8160N
- Aterm WR8170N
- Aterm WR8175N
- Aterm WR8370N
- Aterm WR8600N
- Aterm WR8700N
- Aterm WR8750N
- Aterm WR9300N
- Aterm WR9500N
|
|
- If a user logs in to the product through the telnet service and alters the device configuration, a shell may be executed with the root privilege (CVE-2024-28005)
- An unauthenticated attacker may obtain sensitive information (CVE-2024-28006)
- If a user enables telnet service and logs in, a shell may be executed with the root privilege (CVE-2024-28007)
- If a user logs in to the product through the telnet service, the debug function may be used (CVE-2024-28008)
- An unauthenticated attacker may guess the ID and password, and log in to telnet service (CVE-2024-28009, CVE-2024-28010, CVE-2024-28012)
- An unauthenticated attacker may access telnet service unlimitedly (CVE-2024-28011)
- An attacker may alter the device settings without logging in (CVE-2024-28013)
- An unauthenticated attacker may execute an arbitrary code (CVE-2024-28014)
- A logged-in user may execute an arbitrary command through the device's management page (CVE-2024-28015)
- An unauthenticated attacker may obtain information such as model numbers (CVE-2024-28016)
|
[Update the firmware]
Update the firmware to the latest version according to the information provided by the developer.
[Apply the Workaround]
The developer also recommends users apply the workaround.
[Stop using the products]
Some affected products are no longer supported. Stop using the vulnerable products and consider switching to alternatives.
For more information, refer to the information provided by the developer.
|
NEC Corporation
|
- Buffer Errors(CWE-119) [IPA Evaluation]
- Information Exposure(CWE-200) [IPA Evaluation]
- Improper Authentication(CWE-287) [IPA Evaluation]
- OS Command Injection(CWE-78) [IPA Evaluation]
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2024-28005
- CVE-2024-28006
- CVE-2024-28007
- CVE-2024-28008
- CVE-2024-28009
- CVE-2024-28010
- CVE-2024-28011
- CVE-2024-28012
- CVE-2024-28013
- CVE-2024-28014
- CVE-2024-28015
- CVE-2024-28016
|
- JVN : JVN#82074338
|
- [2024/04/05]
Web page was published
|