All the vulnerabilites related to elecom - lan-w300n\/rs
var-202308-2598
Vulnerability from variot
Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Network equipment provided by ELECOM Co., Ltd. and Logitech Co., Ltd. contains the following multiple vulnerabilities. * Unpublished features (CWE-912) - CVE-2023-32626 , CVE-2023-35991 , CVE-2023-39445 It was * Telnet Inadequate access restrictions to services (CWE-284) - CVE-2023-38132 It was * Unpublished features (CWE-912) - CVE-2023-38576 It was * buffer overflow (CWE-120) - CVE-2023-39454 It was * OS Command injection (CWE-78) - CVE-2023-39455 , CVE-2023-40072 It was * OS Command injection (CWE-78) - CVE-2023-39944 , CVE-2023-40069 This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. It was * A third party with access to the product logs into a specific operation screen and performs arbitrary operations. OS Command is executed - CVE-2023-32626 , CVE-2023-35991 It was * by a third party who has access to the product; telnet logged into the service - CVE-2023-38132 It was * A third party who can log in to the product may perform arbitrary actions from a specific operation screen. OS Command is executed - CVE-2023-38576 It was * A third party with access to the product sends a specially crafted file to a specific operation screen and executes arbitrary code. - CVE-2023-39445 It was * Arbitrary code can be executed by a third party who has access to the product - CVE-2023-39454 It was * A third party who can log in to the product sends a specially crafted request and sends an arbitrary request. OS Command is executed - CVE-2023-39455 , CVE-2023-40072 It was * A third party with access to the product may send a specially crafted request to OS Command is executed - CVE-2023-39944 , CVE-2023-40069
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202308-2598", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "lan-w300n\\/rs", "scope": "eq", "trust": 1.0, "vendor": "elecom", "version": "*" }, { "model": "lan-w300n\\/pr5", "scope": "eq", "trust": 1.0, "vendor": "elecom", "version": "*" }, { "model": "lan-w300n/dr", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1167ghbk2", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-w300n/rs", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-wh300n/re", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1750ghbk-e", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1900ghbk-s", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-x1800gsa-b", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wab-s600-ps", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-733febk2-a", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-f1167acf", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-x1800gsh-b", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-600ghbk-a", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wab-s300", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1750ghbk2-i", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1467ghbk-s", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-w300n/p", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-w300n/pr5", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1900ghbk-a", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-wh300an/dgp", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wab-m1775-ps", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wab-s1167", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1750ghbk", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-wh450n/gp", "scope": "eq", "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": "all s (cve-2023-35991)" }, { "model": "wab-s1775", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-x1800gs-b", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-wh300n/dr", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-wh300n/dgp", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-wh300andgpe", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-f1167acf2", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "wrc-1467ghbk-a", "scope": null, "trust": 0.8, "vendor": "\u30a8\u30ec\u30b3\u30e0\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "lan-w451ngr", "scope": null, "trust": 0.8, "vendor": "\u30ed\u30b8\u30c6\u30c3\u30af\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "db": "NVD", "id": "CVE-2023-32626" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:elecom:lan-w300n\\/rs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:elecom:lan-w300n\\/rs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:elecom:lan-w300n\\/pr5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:elecom:lan-w300n\\/pr5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-32626" } ] }, "cve": "CVE-2023-32626", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2023-002797", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2023-32626", "trust": 1.0, "value": "CRITICAL" }, { "author": "OTHER", "id": "JVNDB-2023-002797", "trust": 0.8, "value": "High" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "db": "NVD", "id": "CVE-2023-32626" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product\u0027s certain management console and execute arbitrary OS commands. Network equipment provided by ELECOM Co., Ltd. and Logitech Co., Ltd. contains the following multiple vulnerabilities. * Unpublished features (CWE-912) - CVE-2023-32626 , CVE-2023-35991 , CVE-2023-39445 It was * Telnet Inadequate access restrictions to services (CWE-284) - CVE-2023-38132 It was * Unpublished features (CWE-912) - CVE-2023-38576 It was * buffer overflow (CWE-120) - CVE-2023-39454 It was * OS Command injection (CWE-78) - CVE-2023-39455 , CVE-2023-40072 It was * OS Command injection (CWE-78) - CVE-2023-39944 , CVE-2023-40069 This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. It was * A third party with access to the product logs into a specific operation screen and performs arbitrary operations. OS Command is executed - CVE-2023-32626 , CVE-2023-35991 It was * by a third party who has access to the product; telnet logged into the service - CVE-2023-38132 It was * A third party who can log in to the product may perform arbitrary actions from a specific operation screen. OS Command is executed - CVE-2023-38576 It was * A third party with access to the product sends a specially crafted file to a specific operation screen and executes arbitrary code. - CVE-2023-39445 It was * Arbitrary code can be executed by a third party who has access to the product - CVE-2023-39454 It was * A third party who can log in to the product sends a specially crafted request and sends an arbitrary request. OS Command is executed - CVE-2023-39455 , CVE-2023-40072 It was * A third party with access to the product may send a specially crafted request to OS Command is executed - CVE-2023-39944 , CVE-2023-40069", "sources": [ { "db": "NVD", "id": "CVE-2023-32626" }, { "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "db": "VULMON", "id": "CVE-2023-32626" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVNVU91630351", "trust": 1.9 }, { "db": "NVD", "id": "CVE-2023-32626", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2023-002797", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-32626", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-32626" }, { "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "db": "NVD", "id": "CVE-2023-32626" } ] }, "id": "VAR-202308-2598", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6666667 }, "last_update_date": "2024-01-24T22:29:00.970000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "wireless LAN Request for switching to alternative products for some network products such as routers ELECOM CO., LTD.", "trust": 0.8, "url": "https://www.elecom.co.jp/news/security/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-002797" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Classic buffer overflow (CWE-120) [ others ]", "trust": 0.8 }, { "problemtype": " Inappropriate access control (CWE-284) [ others ]", "trust": 0.8 }, { "problemtype": "OS Command injection (CWE-78) [ others ]", "trust": 0.8 }, { "problemtype": " Unpublished features (CWE-912) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "db": "NVD", "id": "CVE-2023-32626" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://jvn.jp/en/vu/jvnvu91630351/" }, { "trust": 1.1, "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91630351/index.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-32626" }, { "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "db": "NVD", "id": "CVE-2023-32626" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-32626" }, { "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "db": "NVD", "id": "CVE-2023-32626" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-08-18T00:00:00", "db": "VULMON", "id": "CVE-2023-32626" }, { "date": "2023-08-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "date": "2023-08-18T10:15:09.617000", "db": "NVD", "id": "CVE-2023-32626" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-08-18T00:00:00", "db": "VULMON", "id": "CVE-2023-32626" }, { "date": "2024-01-24T04:50:00", "db": "JVNDB", "id": "JVNDB-2023-002797" }, { "date": "2023-08-23T16:49:06.603000", "db": "NVD", "id": "CVE-2023-32626" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in ELECOM and Logitech network equipment", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-002797" } ], "trust": 0.8 } }
cve-2023-43757
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:10.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20210706-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-2533GHBK2-T", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-2533GHBK-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1750GHBK2-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1750GHBK-E", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1750GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1167GHBK2", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1167GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-F1167ACF", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733GHBK-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733GHBK-C", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-300GHBK2-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-300GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733FEBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-300FEBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-F300NF", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH-H", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300BK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300RD", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300SV", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300BK-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300BK2-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH2-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-H300BK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-H300WH", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-150BK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-150WH", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W300N/RS", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W301NR", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W300N/P", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-WH300N/DGP", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-WH300NDGPE", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section." } ], "problemTypes": [ { "descriptions": [ { "description": "Inadequate Encryption Strength", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-16T06:42:13.507Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "url": "https://www.elecom.co.jp/news/security/20210706-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-43757", "datePublished": "2023-11-16T06:21:13.445Z", "dateReserved": "2023-10-31T07:10:40.728Z", "dateUpdated": "2024-08-02T19:52:10.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32626
Vulnerability from cvelistv5
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | LOGITEC CORPORATION | LAN-W300N/RS |
Version: all versions |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU91630351/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:logitec:lan-w300n\\/rs:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lan-w300n\\/rs", "vendor": "logitec", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:logitec:lan_w300n_pr5:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lan_w300n_pr5", "vendor": "logitec", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32626", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T15:01:06.385485Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T15:05:09.195Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "LAN-W300N/RS", "vendor": "LOGITEC CORPORATION", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W300N/PR5", "vendor": "LOGITEC CORPORATION", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product\u0027s certain management console and execute arbitrary OS commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Hidden Functionality", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-18T09:36:26.714Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU91630351/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-32626", "datePublished": "2023-08-18T09:36:26.714Z", "dateReserved": "2023-08-09T11:54:54.055Z", "dateUpdated": "2024-10-08T15:05:09.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU94119876/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20210706-01/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20230810-01/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20231114-01/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU94119876/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.elecom.co.jp/news/security/20210706-01/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.elecom.co.jp/news/security/20230810-01/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.elecom.co.jp/news/security/20231114-01/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
elecom | wrc-2533ghbk2-t_firmware | - | |
elecom | wrc-2533ghbk2-t | - | |
elecom | wrc-2533ghbk-i_firmware | - | |
elecom | wrc-2533ghbk-i | - | |
elecom | wrc-1750ghbk2-i_firmware | - | |
elecom | wrc-1750ghbk2-i | - | |
elecom | wrc-1750ghbk-e_firmware | - | |
elecom | wrc-1750ghbk-e | - | |
elecom | wrc-1750ghbk_firmware | - | |
elecom | wrc-1750ghbk | - | |
elecom | wrc-1167ghbk2_firmware | - | |
elecom | wrc-1167ghbk2 | - | |
elecom | wrc-1167ghbk_firmware | - | |
elecom | wrc-1167ghbk | - | |
elecom | wrc-f1167acf_firmware | - | |
elecom | wrc-f1167acf | - | |
elecom | wrc-733ghbk_firmware | - | |
elecom | wrc-733ghbk | - | |
elecom | wrc-733ghbk-i_firmware | - | |
elecom | wrc-733ghbk-i | - | |
elecom | wrc-733ghbk-c_firmware | - | |
elecom | wrc-733ghbk-c | - | |
elecom | wrc-300ghbk2-i_firmware | - | |
elecom | wrc-300ghbk2-i | - | |
elecom | wrc-300ghbk_firmware | - | |
elecom | wrc-300ghbk | - | |
elecom | wrc-733febk_firmware | - | |
elecom | wrc-733febk | - | |
elecom | wrc-300febk_firmware | - | |
elecom | wrc-300febk | - | |
elecom | wrc-f300nf_firmware | - | |
elecom | wrc-f300nf | - | |
elecom | wrh-300wh-h_firmware | - | |
elecom | wrh-300wh-h | - | |
elecom | wrh-300bk_firmware | - | |
elecom | wrh-300bk | - | |
elecom | wrh-300wh_firmware | - | |
elecom | wrh-300wh | - | |
elecom | wrh-300rd_firmware | - | |
elecom | wrh-300rd | - | |
elecom | wrh-300sv_firmware | - | |
elecom | wrh-300sv | - | |
elecom | wrh-300bk-s_firmware | - | |
elecom | wrh-300bk-s | - | |
elecom | wrh-300wh-s_firmware | - | |
elecom | wrh-300wh-s | - | |
elecom | wrh-300bk2-s_firmware | - | |
elecom | wrh-300bk2-s | - | |
elecom | wrh-300wh2-s_firmware | - | |
elecom | wrh-300wh2-s | - | |
elecom | wrh-h300bk_firmware | - | |
elecom | wrh-h300bk | - | |
elecom | wrh-h300wh_firmware | - | |
elecom | wrh-h300wh | - | |
elecom | wrh-150bk_firmware | - | |
elecom | wrh-150bk | - | |
elecom | wrh-150wh_firmware | - | |
elecom | wrh-150wh | - | |
elecom | lan-w300n\/rs_firmware | - | |
elecom | lan-w300n\/rs | - | |
elecom | lan-w301nr_firmware | - | |
elecom | lan-w301nr | - | |
elecom | lan-w300n\/p_firmware | - | |
elecom | lan-w300n\/p | - | |
elecom | lan-wh300n\/dgp_firmware | - | |
elecom | lan-wh300n\/dgp | - | |
elecom | lan-wh300ndgpe_firmware | - | |
elecom | lan-wh300ndgpe | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533ghbk2-t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "416614AE-FE5E-4807-8AB0-618F46E48C4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533ghbk2-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "991548FF-6EAD-422F-B2CF-316E96FB7F6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-2533ghbk-i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65FF48A0-3059-4969-9C7D-D12B1E164DE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-2533ghbk-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD11C2A-1EC2-420D-B2AE-FEB67E9866FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1750ghbk2-i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68DEE867-A37C-4199-BE44-222706725533", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1750ghbk2-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1EAF366-E7EB-4864-BB1C-16D828141CFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1750ghbk-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AE44EDE-A5BD-486D-9225-A44BAAB39132", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1750ghbk-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDB8292C-ABDA-4F61-8EF1-D498AE3BF66C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1750ghbk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6E65402-982D-4E0D-A257-806118DBE50A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1750ghbk:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1F1675-60C1-4150-8306-1592F88D3DAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167ghbk2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D00FC11-2C8D-4B88-BB15-157F9C7DBA88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167ghbk2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF1D75E-EF09-4BF7-AC5C-F6CDC5B6ED8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-1167ghbk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F2F7444-D3CE-4C5B-B021-4EA615442478", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-1167ghbk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A69B25FE-0AF4-49CC-9F10-8F98AFF7CCBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-f1167acf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60F558FC-55E4-4DF5-B01D-319A03CE0814", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-f1167acf:-:*:*:*:*:*:*:*", "matchCriteriaId": "C244EA13-D45C-4968-A330-3AD80F588537", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-733ghbk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE82FE52-F2A1-4B9D-B618-7B8D82C497A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-733ghbk:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED2A27DD-B40D-4415-8CCE-063427864910", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-733ghbk-i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9761CF-F0A3-4ACF-B7C0-8BF6EB5F8408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-733ghbk-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "1900274E-7B26-4183-8912-70BCCC306FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-733ghbk-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB404C76-CCEB-4242-B602-8A4F93C9F3FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-733ghbk-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED75E24-5232-4CD1-A8D5-96ECCC3C1D17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-300ghbk2-i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06A5AC4E-6AC5-4CF7-ADAC-4DD51ABF1F4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-300ghbk2-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A85134B-286A-472B-B0D2-C4FE7F5B7FC8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-300ghbk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17D60C3E-D822-4A09-B9EA-8FBA94DEEC0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-300ghbk:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD708BA-8E44-45C9-90A9-2CDA33CFA291", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-733febk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE17625-486F-40E4-9067-07139B69281D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-733febk:-:*:*:*:*:*:*:*", "matchCriteriaId": "2152FA45-F61F-4347-B9B3-992C994D1B64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-300febk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA18046-201B-4009-BE58-B2457DCF206A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-300febk:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AD07548-B957-4275-BE59-F40940E078A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrc-f300nf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6278262-98AD-4D51-B368-C8B7C47F4510", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrc-f300nf:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF251645-9505-49CC-BA4D-1CA454D639D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300wh-h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C616FACD-FD5F-4CE3-A196-3447A0D8B5D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300wh-h:-:*:*:*:*:*:*:*", "matchCriteriaId": "079F2DC5-840A-4201-B46C-F9339968D256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300bk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FF22457-912C-4818-B31E-DCBDF60E6A19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300bk:-:*:*:*:*:*:*:*", "matchCriteriaId": "89ED96E9-D73D-42E7-A86F-7A73E00D2B86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300wh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D59399A-BE39-4E30-BF0F-8EBADD179279", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300wh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E458D9A1-C2AF-4A8F-AC52-8A9D25C303ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300rd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58DFD59C-AAF4-4B14-A6D5-4CC8D436FDC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300rd:-:*:*:*:*:*:*:*", "matchCriteriaId": "5398598E-4579-44DF-95FB-EBB2871A248E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300sv_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1E84D55-C80A-4813-AA15-2E67E1B849C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300sv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D4159F7-1DF3-4827-9784-E338CC3E7D93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300bk-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "221C60DE-F1B0-4284-87DB-EE22B137B16E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300bk-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "85EB981B-03EA-49B3-99EA-A8389F795C63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300wh-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "814F1554-9070-4439-BDD0-379596B6710C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300wh-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "887859FA-3FA7-40E4-BE7B-977C66CF4E37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300bk2-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C8ABEA4-95AB-4B17-BA47-8FC17B62CB6E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300bk2-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "476D444E-3A59-4A46-975C-C33AC3F1BB7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-300wh2-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E429963F-D7D0-46A0-BD2D-98BD6A9F5348", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-300wh2-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C383661F-19E5-4976-BAC2-1077B67D12A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-h300bk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "641FC18A-D8A1-49BB-99D3-C4649B420686", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-h300bk:-:*:*:*:*:*:*:*", "matchCriteriaId": "99341BF6-FD30-421A-9E9C-32C99B6F75AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-h300wh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F58AC396-DE39-4BD2-9E0E-46950312ABD0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-h300wh:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C25CFC-393E-4487-965F-8F922723346F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-150bk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B42DDDAA-92A9-4D41-9369-A163D6045B15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-150bk:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D11F66F-CEEA-42AB-B1E1-B569FB08B0F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:wrh-150wh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "378E5102-178F-4C8D-8C0B-CCCF9769A381", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:wrh-150wh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E8082CE-18E8-438F-B953-D5EF1A27FE0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:lan-w300n\\/rs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AAF4C0E-F270-4062-925E-38C65F7280A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:lan-w300n\\/rs:-:*:*:*:*:*:*:*", "matchCriteriaId": "0032270C-53E3-4A46-95A8-FDE5DEFDC75C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:lan-w301nr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE6896F9-6B59-4420-AB70-21B8B84C3B38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:lan-w301nr:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A667CE5-0926-4986-B9F6-0F2C23F70FEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:lan-w300n\\/p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0376434A-D083-4F7C-9BB1-A9F58F86D3A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:lan-w300n\\/p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAD881BC-A228-4402-8A09-5E862B448A62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:lan-wh300n\\/dgp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F5C8E61-367D-40AE-B37D-F1CED982DAD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:lan-wh300n\\/dgp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B27DECBE-877C-4888-A4B0-C0A65A590640", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:lan-wh300ndgpe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0870306-5179-4477-8C88-EDFC507ED3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:lan-wh300ndgpe:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FE6693-2075-4A08-9ACC-4564A36A16BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section." }, { "lang": "es", "value": "Vulnerabilidad de fuerza de cifrado inadecuada en m\u00faltiples routers proporcionados por ELECOM CO.,LTD. y LOGITEC CORPORATION permite que un atacante no autenticado adyacente a la red adivine la clave de cifrado utilizada para la comunicaci\u00f3n LAN inal\u00e1mbrica e intercepte la comunicaci\u00f3n. En cuanto a los productos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor en la secci\u00f3n [Referencias]." } ], "id": "CVE-2023-43757", "lastModified": "2024-11-21T08:24:43.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-16T07:15:08.600", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://www.elecom.co.jp/news/security/20210706-01/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.elecom.co.jp/news/security/20210706-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU91630351/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20230810-01/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU91630351/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.elecom.co.jp/news/security/20230810-01/ | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
elecom | lan-w300n\/rs_firmware | * | |
elecom | lan-w300n\/rs | - | |
elecom | lan-w300n\/pr5_firmware | * | |
elecom | lan-w300n\/pr5 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:lan-w300n\\/rs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16CDE23E-1661-4D85-813F-5D41930FC2F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:lan-w300n\\/rs:-:*:*:*:*:*:*:*", "matchCriteriaId": "0032270C-53E3-4A46-95A8-FDE5DEFDC75C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:elecom:lan-w300n\\/pr5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13CD45FC-53E8-42EF-AADF-529F306E8114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:elecom:lan-w300n\\/pr5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CC25404-D088-4140-A90A-F7CFA0C0A8BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product\u0027s certain management console and execute arbitrary OS commands." }, { "lang": "es", "value": "La vulnerabilidad de funcionalidad oculta en LAN-W300N/RS todas las versiones, y LAN-W300N/PR5 todas las versiones permite a un atacante no autenticado iniciar sesi\u00f3n en la consola de gesti\u00f3n determinada del producto y ejecutar comandos arbitrarios del sistema operativo.\n" } ], "id": "CVE-2023-32626", "lastModified": "2024-11-21T08:03:43.787", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-18T10:15:09.617", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU91630351/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU91630351/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }