Search criteria
3 vulnerabilities found for fon2601e-fsw-s_firmware by fon
FKIE_CVE-2019-6015
Vulnerability from fkie_nvd - Published: 2019-10-04 19:15 - Updated: 2024-11-21 04:45
Severity ?
Summary
FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | http://jvn.jp/en/vu/JVNVU94678942/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | https://fonjapan.zendesk.com/hc/ja/articles/360000558942 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/vu/JVNVU94678942/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://fonjapan.zendesk.com/hc/ja/articles/360000558942 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fon | fon2601e-se_firmware | * | |
| fon | fon2601e-se | - | |
| fon | fon2601e-re_firmware | * | |
| fon | fon2601e-re | - | |
| fon | fon2601e-fsw-s_firmware | * | |
| fon | fon2601e-fsw-s | - | |
| fon | fon2601e-fsw-b_firmware | * | |
| fon | fon2601e-fsw-b | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fon:fon2601e-se_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D84E4653-CDBE-4F8D-9F41-E1414BFB9AED",
"versionEndIncluding": "1.1.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fon:fon2601e-se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6ED332-83DC-4578-8812-E3A9106B10DC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fon:fon2601e-re_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F162956C-1F49-41D4-9B38-D8CA3D59BE42",
"versionEndIncluding": "1.1.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fon:fon2601e-re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C0AA2F-AF6C-4639-8325-7C3E3C75D0EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fon:fon2601e-fsw-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B71C3E-CD83-4D69-ABF2-F00CD4076A25",
"versionEndIncluding": "1.1.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fon:fon2601e-fsw-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9F1836-5898-46C9-9F3A-6964B6C47F01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fon:fon2601e-fsw-b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A4E5CD-7D82-41FC-B1B3-8759738B6017",
"versionEndIncluding": "1.1.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fon:fon2601e-fsw-b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20899B1F-EB71-45FE-A1D5-90E56A35A9A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
},
{
"lang": "es",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S y FON2601E-FSW-B con versiones de firmware 1.1.7 y anteriores, contienen un problema en el que pueden comportarse como solucionadores abiertos. Si esta vulnerabilidad es explotada, los enrutadores FON pueden ser aprovechados para ataques de amplificaci\u00f3n DNS hacia algunas otras entidades."
}
],
"id": "CVE-2019-6015",
"lastModified": "2024-11-21T04:45:55.100",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-10-04T19:15:10.400",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2019-6015 (GCVE-0-2019-6015)
Vulnerability from cvelistv5 – Published: 2019-10-04 17:55 – Updated: 2024-08-04 20:16
VLAI?
Summary
FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities.
Severity ?
No CVSS data available.
CWE
- DNS amplification attacks
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FON Wireless Limited | FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B |
Affected:
firmware versions 1.1.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:16:23.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B",
"vendor": "FON Wireless Limited",
"versions": [
{
"status": "affected",
"version": "firmware versions 1.1.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DNS amplification attacks",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-26T15:16:50",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2019-6015",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B",
"version": {
"version_data": [
{
"version_value": "firmware versions 1.1.7 and earlier"
}
]
}
}
]
},
"vendor_name": "FON Wireless Limited"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DNS amplification attacks"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942",
"refsource": "MISC",
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"name": "http://jvn.jp/en/vu/JVNVU94678942/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2019-6015",
"datePublished": "2019-10-04T17:55:42",
"dateReserved": "2019-01-10T00:00:00",
"dateUpdated": "2024-08-04T20:16:23.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-6015 (GCVE-0-2019-6015)
Vulnerability from nvd – Published: 2019-10-04 17:55 – Updated: 2024-08-04 20:16
VLAI?
Summary
FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities.
Severity ?
No CVSS data available.
CWE
- DNS amplification attacks
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FON Wireless Limited | FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B |
Affected:
firmware versions 1.1.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:16:23.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B",
"vendor": "FON Wireless Limited",
"versions": [
{
"status": "affected",
"version": "firmware versions 1.1.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DNS amplification attacks",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-26T15:16:50",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2019-6015",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B",
"version": {
"version_data": [
{
"version_value": "firmware versions 1.1.7 and earlier"
}
]
}
}
]
},
"vendor_name": "FON Wireless Limited"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DNS amplification attacks"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942",
"refsource": "MISC",
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"name": "http://jvn.jp/en/vu/JVNVU94678942/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2019-6015",
"datePublished": "2019-10-04T17:55:42",
"dateReserved": "2019-01-10T00:00:00",
"dateUpdated": "2024-08-04T20:16:23.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}