CVE-2019-6015 (GCVE-0-2019-6015)
Vulnerability from cvelistv5 – Published: 2019-10-04 17:55 – Updated: 2024-08-04 20:16
VLAI?
Summary
FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities.
Severity ?
No CVSS data available.
CWE
- DNS amplification attacks
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FON Wireless Limited | FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B |
Affected:
firmware versions 1.1.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:16:23.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B",
"vendor": "FON Wireless Limited",
"versions": [
{
"status": "affected",
"version": "firmware versions 1.1.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DNS amplification attacks",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-26T15:16:50",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2019-6015",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B",
"version": {
"version_data": [
{
"version_value": "firmware versions 1.1.7 and earlier"
}
]
}
}
]
},
"vendor_name": "FON Wireless Limited"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DNS amplification attacks"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942",
"refsource": "MISC",
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"name": "http://jvn.jp/en/vu/JVNVU94678942/index.html",
"refsource": "MISC",
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2019-6015",
"datePublished": "2019-10-04T17:55:42",
"dateReserved": "2019-01-10T00:00:00",
"dateUpdated": "2024-08-04T20:16:23.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fon:fon2601e-se_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.7\", \"matchCriteriaId\": \"D84E4653-CDBE-4F8D-9F41-E1414BFB9AED\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:fon:fon2601e-se:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D6ED332-83DC-4578-8812-E3A9106B10DC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fon:fon2601e-re_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.7\", \"matchCriteriaId\": \"F162956C-1F49-41D4-9B38-D8CA3D59BE42\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:fon:fon2601e-re:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8C0AA2F-AF6C-4639-8325-7C3E3C75D0EE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fon:fon2601e-fsw-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.7\", \"matchCriteriaId\": \"E0B71C3E-CD83-4D69-ABF2-F00CD4076A25\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:fon:fon2601e-fsw-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE9F1836-5898-46C9-9F3A-6964B6C47F01\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fon:fon2601e-fsw-b_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.7\", \"matchCriteriaId\": \"F1A4E5CD-7D82-41FC-B1B3-8759738B6017\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:fon:fon2601e-fsw-b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20899B1F-EB71-45FE-A1D5-90E56A35A9A0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities.\"}, {\"lang\": \"es\", \"value\": \"FON2601E-SE, FON2601E-RE, FON2601E-FSW-S y FON2601E-FSW-B con versiones de firmware 1.1.7 y anteriores, contienen un problema en el que pueden comportarse como solucionadores abiertos. Si esta vulnerabilidad es explotada, los enrutadores FON pueden ser aprovechados para ataques de amplificaci\\u00f3n DNS hacia algunas otras entidades.\"}]",
"id": "CVE-2019-6015",
"lastModified": "2024-11-21T04:45:55.100",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-10-04T19:15:10.400",
"references": "[{\"url\": \"http://jvn.jp/en/vu/JVNVU94678942/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://fonjapan.zendesk.com/hc/ja/articles/360000558942\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://jvn.jp/en/vu/JVNVU94678942/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://fonjapan.zendesk.com/hc/ja/articles/360000558942\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-6015\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2019-10-04T19:15:10.400\",\"lastModified\":\"2024-11-21T04:45:55.100\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities.\"},{\"lang\":\"es\",\"value\":\"FON2601E-SE, FON2601E-RE, FON2601E-FSW-S y FON2601E-FSW-B con versiones de firmware 1.1.7 y anteriores, contienen un problema en el que pueden comportarse como solucionadores abiertos. Si esta vulnerabilidad es explotada, los enrutadores FON pueden ser aprovechados para ataques de amplificaci\u00f3n DNS hacia algunas otras entidades.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fon:fon2601e-se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.7\",\"matchCriteriaId\":\"D84E4653-CDBE-4F8D-9F41-E1414BFB9AED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fon:fon2601e-se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6ED332-83DC-4578-8812-E3A9106B10DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fon:fon2601e-re_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.7\",\"matchCriteriaId\":\"F162956C-1F49-41D4-9B38-D8CA3D59BE42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fon:fon2601e-re:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C0AA2F-AF6C-4639-8325-7C3E3C75D0EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fon:fon2601e-fsw-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.7\",\"matchCriteriaId\":\"E0B71C3E-CD83-4D69-ABF2-F00CD4076A25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fon:fon2601e-fsw-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE9F1836-5898-46C9-9F3A-6964B6C47F01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fon:fon2601e-fsw-b_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.7\",\"matchCriteriaId\":\"F1A4E5CD-7D82-41FC-B1B3-8759738B6017\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fon:fon2601e-fsw-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20899B1F-EB71-45FE-A1D5-90E56A35A9A0\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/vu/JVNVU94678942/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://fonjapan.zendesk.com/hc/ja/articles/360000558942\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://jvn.jp/en/vu/JVNVU94678942/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://fonjapan.zendesk.com/hc/ja/articles/360000558942\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…