Vulnerabilites related to yamaha - rt52pro
cve-2008-0524
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/28690 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27491 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40015 | vdb-entry, x_refsource_XF | |
http://jvn.jp/jp/JVN%2388575577/index.html | third-party-advisory, x_refsource_JVN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:55.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html" }, { "name": "28690", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28690" }, { "name": "27491", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27491" }, { "name": "yamaha-routers-http-csrf(40015)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40015" }, { "name": "JVN#88575577", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/jp/JVN%2388575577/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html" }, { "name": "28690", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28690" }, { "name": "27491", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27491" }, { "name": "yamaha-routers-http-csrf(40015)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40015" }, { "name": "JVN#88575577", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/jp/JVN%2388575577/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0524", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html", "refsource": "CONFIRM", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html" }, { "name": "28690", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28690" }, { "name": "27491", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27491" }, { "name": "yamaha-routers-http-csrf(40015)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40015" }, { "name": "JVN#88575577", "refsource": "JVN", "url": "http://jvn.jp/jp/JVN%2388575577/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0524", "datePublished": "2008-01-31T19:30:00", "dateReserved": "2008-01-31T00:00:00", "dateUpdated": "2024-08-07T07:46:55.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
yamaha | rt107e | * | |
yamaha | rt52pro | * | |
yamaha | rt56v | * | |
yamaha | rt57i | * | |
yamaha | rt58i | * | |
yamaha | rt60w | * | |
yamaha | rt80i | * | |
yamaha | rta50i | * | |
yamaha | rta52i | * | |
yamaha | rta54i | * | |
yamaha | rta55i | * | |
yamaha | rtv700 | * | |
yamaha | rtw65b | * | |
yamaha | rtw65i | * | |
yamaha | rtx1000 | * | |
yamaha | rtx1100 | * | |
yamaha | rtx1500 | * | |
yamaha | srt100 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:rt107e:*:*:*:*:*:*:*:*", "matchCriteriaId": "425CDF9A-F6CB-46A0-9820-D3FDDF189E9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt52pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3265767-161D-4713-BFF2-75E8A8A50A71", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt56v:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AC8D1C0-6AF5-43E2-A249-0668541DE24A", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt57i:*:*:*:*:*:*:*:*", "matchCriteriaId": "E34B7C2B-399B-4892-B715-8ACA3C2FCD39", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt58i:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4D07F7B-638C-441A-B2FD-F1555CD4D16F", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt60w:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0EEB41E-F757-49C4-9667-E35BE83308E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt80i:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E169527-2124-4A1D-84BB-0CAE4A2E380A", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rta50i:*:*:*:*:*:*:*:*", "matchCriteriaId": "B69B9D13-5F18-4746-8659-FDE58C262912", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rta52i:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E7D2A85-18A7-42F9-A057-F61A57404943", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rta54i:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAEBCB69-D290-49FF-B800-91D7C53EFECE", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rta55i:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9517A29-D59B-4C6B-8BD5-2F856D91CE79", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtv700:*:*:*:*:*:*:*:*", "matchCriteriaId": "51AF5618-F041-43F9-B225-ADEAE8379C3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtw65b:*:*:*:*:*:*:*:*", "matchCriteriaId": "2749A0C6-E134-4412-947F-FBEC20F96F10", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtw65i:*:*:*:*:*:*:*:*", "matchCriteriaId": "92BE52D4-DE4B-477A-84E7-C875C62EC675", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "83831044-089B-4BA9-965C-7A5B2CBBACB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "52AA01AA-C220-411B-8F96-77FE54EFFAF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx1500:*:*:*:*:*:*:*:*", "matchCriteriaId": "B03C6BB5-8BA2-475C-86FA-69B33BF7B3E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:srt100:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECD5B3A4-A120-4DD3-8F66-FA298F7377A8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en la interfaz de administraci\u00f3n en m\u00faltiples routers de Yamaha RT series. Permite a atacantes remotos cambiar configuraciones de contrase\u00f1as y probablemente otros ajustes de configuraci\u00f3n como administradores a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2008-0524", "lastModified": "2024-11-21T00:42:18.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-01-31T20:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://jvn.jp/jp/JVN%2388575577/index.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28690" }, { "source": "cve@mitre.org", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/27491" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/jp/JVN%2388575577/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27491" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40015" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200801-0148
Vulnerability from variot
Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors. Multiple Yamaha routers provide a web-based interface for users to configure the settings of the routers. The web interface is vulnerable to cross-site request forgery.If the administrator views a malicious website while logged onto the web interface, the password and other configuration settings can be modified. Exploiting this issue may allow a remote attacker to execute arbitrary actions on an affected device. Yamaha routers in the RT and SRT series are vulnerable.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
The vulnerability is caused due to the device allowing users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to e.g. change the administrator password by enticing a logged-in administrator to visit a malicious site.
Please see the vendor's advisory for a list of affected models.
SOLUTION: Update to the latest firmware versions. Please see the vendor's advisory for details.
Do not browse untrusted websites or follow untrusted links while logged on to the device.
PROVIDED AND/OR DISCOVERED BY: Reported via JVN.
ORIGINAL ADVISORY: Yamaha Corporation: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html
JVN#88575577: http://jvn.jp/jp/JVN%2388575577/index.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200801-0148", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt58i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rt80i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rt52pro", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rt107e", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rta50i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rta52i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rtx1500", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rt60w", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rta54i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rt57i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rtv700", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rtx1000", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "srt100", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rta55i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rtw65b", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rt56v", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rtw65i", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rtx1100", "scope": "eq", "trust": 1.0, "vendor": "yamaha", "version": "*" }, { "model": "rtx1500", "scope": null, "trust": 0.9, "vendor": "yamaha", "version": null }, { "model": "rtx1100", "scope": null, "trust": 0.9, "vendor": "yamaha", "version": null }, { "model": "rtx1000", "scope": null, "trust": 0.9, "vendor": "yamaha", "version": null }, { "model": "rtv700", "scope": null, "trust": 0.9, "vendor": "yamaha", "version": null }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "1000" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "107e" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "1100" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "1500" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "55i" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "57i" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "58i" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "sr100" }, { "model": "ip38x series", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v700" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rt56v" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rt57i" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rt58i" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rt60w" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rt80i" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rta50i" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rta52i" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rta54i" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rta55i" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rtw65b" }, { "model": "netvolante series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rtw65i" }, { "model": "rt series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rt107e" }, { "model": "rtv series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rtv01" }, { "model": "rtv series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rtv700" }, { "model": "rtx series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rtx1000" }, { "model": "rtx series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rtx1100" }, { "model": "rtx series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "rtx1500" }, { "model": "srt series", "scope": "eq", "trust": 0.8, "vendor": "yamaha", "version": "srt100" }, { "model": "rtw65i", "scope": null, "trust": 0.6, "vendor": "yamaha", "version": null }, { "model": "rta54i", "scope": null, "trust": 0.6, "vendor": "yamaha", "version": null }, { "model": "srt100", "scope": null, "trust": 0.6, "vendor": "yamaha", "version": null }, { "model": "rta52i", "scope": null, "trust": 0.6, "vendor": "yamaha", "version": null }, { "model": "rta50i", "scope": null, "trust": 0.6, "vendor": "yamaha", "version": null }, { "model": "rtw65b", "scope": null, "trust": 0.6, "vendor": "yamaha", "version": null }, { "model": "srt100", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rtw65i", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rtw65b", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rta55i", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rta54i", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rta52i", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rta50i", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rt80i", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rt60w", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rt58i", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rt57i", "scope": null, "trust": 0.3, "vendor": "yamaha", "version": null }, { "model": "rt56v", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rt52pro", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" }, { "model": "rt107e", "scope": "eq", "trust": 0.3, "vendor": "yamaha", "version": "0" } ], "sources": [ { "db": "BID", "id": "27491" }, { "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "db": "NVD", "id": "CVE-2008-0524" }, { "db": "CNNVD", "id": "CNNVD-200801-468" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yamaha:rt52pro:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rt56v:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rta55i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rtv700:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rt57i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rt58i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rt60w:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rtw65b:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rtw65i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rt107e:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rta52i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rta54i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rtx1500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:srt100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rt80i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rta50i:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rtx1000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:yamaha:rtx1100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-0524" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "JPCERT/CC", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-468" } ], "trust": 0.6 }, "cve": "CVE-2008-0524", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2008-000005", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:H/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-30649", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-0524", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2008-000005", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200801-468", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-30649", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-30649" }, { "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "db": "NVD", "id": "CVE-2008-0524" }, { "db": "CNNVD", "id": "CNNVD-200801-468" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors. Multiple Yamaha routers provide a web-based interface for users to configure the settings of the routers. The web interface is vulnerable to cross-site request forgery.If the administrator views a malicious website while logged onto the web interface, the password and other configuration settings can be modified. \nExploiting this issue may allow a remote attacker to execute arbitrary actions on an affected device. \nYamaha routers in the RT and SRT series are vulnerable. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nThe vulnerability is caused due to the device allowing users to\nperform certain actions via HTTP requests without performing any\nvalidity checks to verify the request. This can be exploited to e.g. \nchange the administrator password by enticing a logged-in\nadministrator to visit a malicious site. \n\nPlease see the vendor\u0027s advisory for a list of affected models. \n\nSOLUTION:\nUpdate to the latest firmware versions. Please see the vendor\u0027s\nadvisory for details. \n\nDo not browse untrusted websites or follow untrusted links while\nlogged on to the device. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported via JVN. \n\nORIGINAL ADVISORY:\nYamaha Corporation:\nhttp://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html\n\nJVN#88575577:\nhttp://jvn.jp/jp/JVN%2388575577/index.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0524" }, { "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "db": "BID", "id": "27491" }, { "db": "VULHUB", "id": "VHN-30649" }, { "db": "PACKETSTORM", "id": "63075" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVN88575577", "trust": 2.9 }, { "db": "NVD", "id": "CVE-2008-0524", "trust": 2.8 }, { "db": "BID", "id": "27491", "trust": 2.8 }, { "db": "SECUNIA", "id": "28690", "trust": 2.7 }, { "db": "XF", "id": "40015", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2008-000005", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-200801-468", "trust": 0.7 }, { "db": "JVN", "id": "JVN#88575577", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-30649", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63075", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30649" }, { "db": "BID", "id": "27491" }, { "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "db": "PACKETSTORM", "id": "63075" }, { "db": "NVD", "id": "CVE-2008-0524" }, { "db": "CNNVD", "id": "CNNVD-200801-468" } ] }, "id": "VAR-200801-0148", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-30649" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:58:55.307000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NV08-001", "trust": 0.8, "url": "http://www.nec.co.jp/security-info/secinfo/nv08-001.html" }, { "title": "JVN88575577", "trust": 0.8, "url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/jvn88575577.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-000005" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30649" }, { "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "db": "NVD", "id": "CVE-2008-0524" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/27491" }, { "trust": 2.5, "url": "http://secunia.com/advisories/28690" }, { "trust": 2.1, "url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/jvn88575577.html" }, { "trust": 2.1, "url": "http://jvn.jp/jp/jvn%2388575577/index.html" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/40015" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40015" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0524" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/english/vuln/200801_yamaha_press_en.html" }, { "trust": 0.8, "url": "http://jvn.jp/en/jp/jvn88575577/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0524" }, { "trust": 0.3, "url": "http://www.ipa.go.jp/security/vuln/documents/2008/200801_yamaha.html" }, { "trust": 0.3, "url": "http://jvndb.jvn.jp/contents/ja/2008/jvndb-2008-000005.html" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/17358/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28690/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30649" }, { "db": "BID", "id": "27491" }, { "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "db": "PACKETSTORM", "id": "63075" }, { "db": "NVD", "id": "CVE-2008-0524" }, { "db": "CNNVD", "id": "CNNVD-200801-468" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-30649" }, { "db": "BID", "id": "27491" }, { "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "db": "PACKETSTORM", "id": "63075" }, { "db": "NVD", "id": "CVE-2008-0524" }, { "db": "CNNVD", "id": "CNNVD-200801-468" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-01-31T00:00:00", "db": "VULHUB", "id": "VHN-30649" }, { "date": "2008-01-29T00:00:00", "db": "BID", "id": "27491" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "date": "2008-01-30T02:17:24", "db": "PACKETSTORM", "id": "63075" }, { "date": "2008-01-31T20:00:00", "db": "NVD", "id": "CVE-2008-0524" }, { "date": "2008-01-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200801-468" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-30649" }, { "date": "2015-05-07T17:33:00", "db": "BID", "id": "27491" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-000005" }, { "date": "2017-08-08T01:29:37.337000", "db": "NVD", "id": "CVE-2008-0524" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200801-468" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-468" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Yamaha routers vulnerable to cross-site request forgery", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-000005" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-468" } ], "trust": 0.6 } }