CVE-2023-47213
Vulnerability from cvelistv5
Published
2023-11-16 07:29
Modified
2024-10-21 14:27
Severity ?
EPSS score ?
Summary
First Corporation's DVRs use a hard-coded password, which may allow a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU99077347/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.c-first.co.jp/information/ddososhirase/ | Vendor Advisory | |
vultures@jpcert.or.jp | https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf | Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.c-first.co.jp/information/ddososhirase/" }, { "tags": [ "x_transferred" ], "url": "https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU99077347/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:c-first:cfr-1004ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-1008ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-1016ea_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-16ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eaam_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eabc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-4ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eaa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8eha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-8ehd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-904e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-908e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:cfr-916e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404aa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404ab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404ha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-404hd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808aa_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808ab_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808ha_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:c-first:md-808hd_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "md-808hd_firmware", "vendor": "c-first", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-47213", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:36:20.086069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-21T14:27:58.805Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "CFR-904E, CFR-908E, CFR-916E", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "CFR-4EHD, CFR-8EHD, CFR-16EHD", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "CFR-4EHA, CFR-8EHA, CFR-16EHA", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "CFR-4EAAM, CFR-4EABC", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "CFR-4EAA, CFR-8EAA, CFR-16EAA", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "CFR-4EAB, CFR-8EAB, CFR-16EAB", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "CFR-1004EA, CFR-1008EA, CFR-1016EA", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "MD-404HD, MD-808HD", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "MD-404HA, MD-808HA", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "MD-404AA, MD-808AA", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] }, { "product": "MD-404AB, MD-808AB", "vendor": "First Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "First Corporation\u0027s DVRs use a hard-coded password, which may allow a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround." } ], "problemTypes": [ { "descriptions": [ { "description": "Use of hard-coded password", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-16T07:29:28.376Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.c-first.co.jp/information/ddososhirase/" }, { "url": "https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf" }, { "url": "https://jvn.jp/en/vu/JVNVU99077347/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-47213", "datePublished": "2023-11-16T07:29:28.376Z", "dateReserved": "2023-11-15T01:42:55.281Z", "dateUpdated": "2024-10-21T14:27:58.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-47213\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2023-11-16T08:15:32.840\",\"lastModified\":\"2024-10-21T15:35:08.740\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"First Corporation\u0027s DVRs use a hard-coded password, which may allow a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround.\"},{\"lang\":\"es\",\"value\":\"Los DVR de First Corporation utilizan una contrase\u00f1a codificada, lo que puede permitir que un atacante remoto no autenticado reescriba u obtenga la informaci\u00f3n de configuraci\u00f3n del dispositivo afectado. Tenga en cuenta que las actualizaciones se proporcionan solo para los modelos m\u00e1s recientes de CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB y MD-808AB. En cuanto a los dem\u00e1s productos, aplique workaround.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-1004ea_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5825474F-41ED-4C9B-9066-09444B5272E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-1004ea:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC008F3-9362-4466-93E3-1423E3A8F7CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-1008ea_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCBA5D3-2942-4AC4-8891-C2539A8221A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-1008ea:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A5AE65-A0E9-47A6-8B4A-A965F206D945\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-1016ea_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109B6B6F-0E58-4EFC-92F5-D01A6D4F6050\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-1016ea:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B6F5E1-19CE-4353-83C4-9E9BAC59F3DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-16eaa_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA76BA6-DB42-432F-B092-EF525002FE1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-16eaa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC9F82F-EDF3-4F5D-BA28-8021406B38CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-16eab_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EECDA12-C85D-4938-B464-81871BE6D65C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-16eab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A292B7-C1B6-4A9B-AF2F-665647AD15CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-16eha_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD51F31A-821C-4177-90F9-9F906AB6947B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-16eha:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F9E23B6-BF8A-460D-AB8E-715865B60D98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-16ehd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F14C536-5D25-40DB-AD3A-3D680DC125F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-16ehd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C93D63-A331-4734-B02C-84E31911183D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-4eaa_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89F748BF-5CA0-4EC5-86A5-8BF96BACDF8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-4eaa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70644AD-C793-4E8A-A186-FC3384A9DA09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-4eaam_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F65158-35BE-47F6-9F23-E592E12FBA42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-4eaam:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6788DE81-98C8-42FA-975E-F22A70CF5328\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-4eab_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D67CDAAD-3B8C-4EF2-83D5-2443389CED60\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-4eab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E52C63E-3C34-41CA-A12F-A691CC2FE71E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-4eabc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"707835D1-2323-4984-9DA3-C46D023A5BE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-4eabc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F437F9-B9AA-48FB-A2B1-D1FC96DE865D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-4eha_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA935841-396B-42AC-87EE-D5250309D851\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-4eha:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9402CDD-5159-40C7-B341-2F3C01941F72\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-4ehd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4B9ABC7-C742-402E-96F2-5EC398D186A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-4ehd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B2C6CA6-9EBC-426D-BDBE-6738164C928E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-8eaa_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF3876EE-50A9-48FD-BF86-547ADB0A23DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-8eaa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"726839B1-59D5-4B9A-9696-DB4E18B13948\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-8eab_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E00035-C9F2-4A6D-997E-6FFE6C1B1FF8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-8eab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94DC7DB8-9B44-4968-90A2-34283047596C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-8eha_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70A252A5-60BB-464D-9497-B5F288104B0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-8eha:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9CC4970-3AF1-4070-9BD3-C388D2D38359\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-8ehd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C10AFAAE-E3AA-444A-92E5-A0F5F6060CC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-8ehd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D002126F-D722-4BD4-A269-08B8F1D40BBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-904e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47E288C-360A-4E57-8972-D005A65D8522\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-904e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABE81EF-440D-49F6-BAAC-977106E5485C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-908e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE167139-4702-4D8F-9846-6B8925BEC926\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-908e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A569A78-FAD5-4066-A026-3A8BC8DAED71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:cfr-916e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B510418-43B3-494F-837D-27A3B10ADC3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:cfr-916e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A087B2FC-800B-4CAE-93A3-DF7EC34625D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-404aa_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96710570-7241-4799-B37E-FD9F71225479\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-404aa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9AB4E20-9F98-4246-B701-C940BC8A117E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-404ab_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1652800-6EB0-4513-BCB5-3B3DD6BDAA96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-404ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6D4D91-0519-485C-B7A5-52E869B73589\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-404ha_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5935347-858F-4D91-8C68-5946F58557B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-404ha:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1EAAD8-FFC4-45A6-8678-C39C347AB7AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-404hd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F7F46B-1CF6-4308-86ED-499F769D62D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-404hd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48266165-7A81-4593-BB02-DEE028602AE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-808aa_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"130ED09D-97E4-47F1-BB5E-BD50838102DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-808aa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84CD34A-C75B-4DC6-AE19-8D51D6A38ED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-808ab_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8324E0AA-4579-4F67-9881-9FCD166C0B45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-808ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE5F07A-E0D6-4A69-AEB2-5831B70447A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-808ha_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D3CB46-C862-4938-B4C0-7D5706EAF590\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-808ha:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B020F92-62DA-4D50-965E-7D4F24C95B1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:c-first:md-808hd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2EA778-F4B2-42EF-A13A-BA3679E053F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:c-first:md-808hd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA0B38E-E2FE-45EF-9D4E-89E9BC346A09\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU99077347/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.c-first.co.jp/information/ddososhirase/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.