|
[Japanese]
|
JVNDB-2026-001001
|
Authentication bypass vulnerability in OpenBlocks series
|
OpenBlocks series provided by Plat'Home Co.,Ltd. contains the following vulnerability.- Authentication bypass (CWE-288) - CVE-2026-21411
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
|
CVSS V3 Severity: Base Metrics 8.8 (High) [Other]
- Attack Vector: Adjacent Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
|
|
Plat'Home Co., Ltd.
- OpenBlocks IDM RX1 (FW5.0.x) all versions prior to FW5.0.8
- OpenBlocks IoT DX1 (FW5.0.x) all versions prior to FW5.0.8
- OpenBlocks IoT EX/BX models (FW5.0.x) all versions prior to FW5.0.8
- OpenBlocks IoT FX1 (FW5.0.x) all versions prior to FW5.0.8
- OpenBlocks IoT VX2 (FW5.0.x) all versions prior to FW5.0.8
- OpenBlocks IX9 models with FW (FW5.0.x) all versions prior to FW5.0.8
|
|
An attacker could bypass administrator authentication and change the password.
|
[Update the Software]
Update the software to the latest version according to the information provided by the developer.
|
Plat'Home Co., Ltd.
|
- Authentication Bypass Using an Alternate Path or Channel(CWE-288) [Other]
|
- CVE-2026-21411
|
- JVN : JVNVU#97172240
|
- [2026/01/07]
Web page was published
|