Search criteria
4 vulnerabilities found for atermwr9500n by nec
VAR-201303-0238
Vulnerability from variot - Updated: 2023-12-18 13:29Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device. Sen UENO of Tricorder Co. Ltd., Hiroshi Kumagai and Kimura Youichi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, settings of the product may be initialized, or the product may be rebooted. NEC aterm is a number of wireless routing devices. Because the application allows users to perform certain operations through HTTP requests without performing any validity check, the attacker can exploit the vulnerability to perform specific operations when the logged-in administrator accesses a malicious website. action. Exploiting these issues may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201303-0238",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "atermwr8370n",
"scope": "eq",
"trust": 1.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwm3600r",
"scope": "eq",
"trust": 1.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwr9500n",
"scope": "eq",
"trust": 1.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwm3450rn",
"scope": "eq",
"trust": 1.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwr8600n",
"scope": "eq",
"trust": 1.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwr8160n",
"scope": "eq",
"trust": 1.6,
"vendor": "nec",
"version": null
},
{
"model": "aterm wm3450rn",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "aterm wm3600r",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "aterm wr8160n",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "aterm wr8170n",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "aterm wr8370n",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "aterm wr8600n",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "aterm wr8700n",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "aterm wr9500n",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "atermwr9500n router",
"scope": null,
"trust": 0.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwr8600n router",
"scope": null,
"trust": 0.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwr8370n router",
"scope": null,
"trust": 0.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwr8160n router",
"scope": null,
"trust": 0.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwm3600r router",
"scope": null,
"trust": 0.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwm3450rn router",
"scope": null,
"trust": 0.6,
"vendor": "nec",
"version": null
},
{
"model": "atermwr9500n",
"scope": "eq",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwr8600n",
"scope": "eq",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwr8370n",
"scope": "eq",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwr8160n",
"scope": "eq",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwm3600r",
"scope": "eq",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwm3450rn",
"scope": "eq",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwr9300n",
"scope": "ne",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwr8750n",
"scope": "ne",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwr8175n",
"scope": "ne",
"trust": 0.3,
"vendor": "nec",
"version": "0"
},
{
"model": "atermwm3800r",
"scope": "ne",
"trust": 0.3,
"vendor": "nec",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"db": "BID",
"id": "58625"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:nec:atermwr9500n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:nec:atermwr8600n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:nec:atermwr8160n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:nec:atermwm3450rn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:nec:atermwr8370n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:nec:atermwm3600r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0717"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sen UENO of Tricorder Co. Ltd, Hiroshi Kumagai and Kimura Youichi",
"sources": [
{
"db": "BID",
"id": "58625"
}
],
"trust": 0.3
},
"cve": "CVE-2013-0717",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 4.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2013-000024",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"id": "CNVD-2013-01929",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-0717",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2013-000024",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2013-01929",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201303-390",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device. Sen UENO of Tricorder Co. Ltd., Hiroshi Kumagai and Kimura Youichi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, settings of the product may be initialized, or the product may be rebooted. NEC aterm is a number of wireless routing devices. Because the application allows users to perform certain operations through HTTP requests without performing any validity check, the attacker can exploit the vulnerability to perform specific operations when the logged-in administrator accesses a malicious website. action. \nExploiting these issues may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"db": "BID",
"id": "58625"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000024",
"trust": 3.3
},
{
"db": "NVD",
"id": "CVE-2013-0717",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVN59503133",
"trust": 2.7
},
{
"db": "SECUNIA",
"id": "52666",
"trust": 1.2
},
{
"db": "CNVD",
"id": "CNVD-2013-01929",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#59503133",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201303-390",
"trust": 0.6
},
{
"db": "BID",
"id": "58625",
"trust": 0.3
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"db": "BID",
"id": "58625"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
]
},
"id": "VAR-201303-0238",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
}
]
},
"last_update_date": "2023-12-18T13:29:54.503000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "NV13-005",
"trust": 0.8,
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"title": "NEC multiple aterm router cross-site request forgery vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/32961"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-352",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"db": "NVD",
"id": "CVE-2013-0717"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "http://jvn.jp/en/jp/jvn59503133/index.html"
},
{
"trust": 1.9,
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"trust": 1.6,
"url": "http://jvn.jp/en/jp/jvn59503133/6443/index.html"
},
{
"trust": 1.6,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000024"
},
{
"trust": 0.9,
"url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000024.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0717"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0717"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/52666/"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/52666"
},
{
"trust": 0.3,
"url": "http://jpn.nec.com/index.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"db": "BID",
"id": "58625"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"db": "BID",
"id": "58625"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-03-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"date": "2013-03-19T00:00:00",
"db": "BID",
"id": "58625"
},
{
"date": "2013-03-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"date": "2013-03-19T18:55:03.347000",
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"date": "2013-03-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-03-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-01929"
},
{
"date": "2013-03-19T00:00:00",
"db": "BID",
"id": "58625"
},
{
"date": "2013-06-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000024"
},
{
"date": "2013-03-21T04:00:00",
"db": "NVD",
"id": "CVE-2013-0717"
},
{
"date": "2013-03-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple NEC mobile routers vulnerable to cross-site request forgery",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000024"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "cross-site request forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201303-390"
}
],
"trust": 0.6
}
}
FKIE_CVE-2013-0717
Vulnerability from fkie_nvd - Published: 2013-03-19 18:55 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| nec | atermwm3450rn | - | |
| nec | atermwm3600r | - | |
| nec | atermwr8160n | - | |
| nec | atermwr8370n | - | |
| nec | atermwr8600n | - | |
| nec | atermwr9500n | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:nec:atermwm3450rn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2214321D-ABC8-4FFD-BF33-E1F707386DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:nec:atermwm3600r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D5040C6-5035-46CF-A80C-E2D69A5E3401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:nec:atermwr8160n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36D01D2D-ABD8-47C7-8070-41608AE59DE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:nec:atermwr8370n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20AB6685-5F0E-46E9-8776-2FBF8ACE8DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:nec:atermwr8600n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56589FA6-6A4E-4D47-83BE-9E246E722202",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:nec:atermwr9500n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC88A006-8AB5-4780-8280-676B34BFE7F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades CSRF en la utilidad de gesti\u00f3n web de los enrutadores NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, y AtermWM3450RN, permite a los atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para peticiones que (1)inicializan opciones o (2) reinician el dispositivo."
}
],
"id": "CVE-2013-0717",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-03-19T18:55:03.347",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2013-0717 (GCVE-0-2013-0717)
Vulnerability from cvelistv5 – Published: 2013-03-19 18:00 – Updated: 2024-09-17 02:51- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:33:05.603Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"name": "JVNDB-2013-000024",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"name": "JVN#59503133",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-19T18:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"name": "JVNDB-2013-000024",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"name": "JVN#59503133",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0717",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://jvn.jp/en/jp/JVN59503133/6443/index.html",
"refsource": "CONFIRM",
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"name": "JVNDB-2013-000024",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
},
{
"name": "http://jpn.nec.com/security-info/secinfo/nv13-005.html",
"refsource": "CONFIRM",
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"name": "JVN#59503133",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-0717",
"datePublished": "2013-03-19T18:00:00Z",
"dateReserved": "2012-12-28T00:00:00Z",
"dateUpdated": "2024-09-17T02:51:50.999Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-0717 (GCVE-0-2013-0717)
Vulnerability from nvd – Published: 2013-03-19 18:00 – Updated: 2024-09-17 02:51- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:33:05.603Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"name": "JVNDB-2013-000024",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"name": "JVN#59503133",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-03-19T18:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"name": "JVNDB-2013-000024",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"name": "JVN#59503133",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0717",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://jvn.jp/en/jp/JVN59503133/6443/index.html",
"refsource": "CONFIRM",
"url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
},
{
"name": "JVNDB-2013-000024",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
},
{
"name": "http://jpn.nec.com/security-info/secinfo/nv13-005.html",
"refsource": "CONFIRM",
"url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
},
{
"name": "JVN#59503133",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN59503133/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-0717",
"datePublished": "2013-03-19T18:00:00Z",
"dateReserved": "2012-12-28T00:00:00Z",
"dateUpdated": "2024-09-17T02:51:50.999Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}