cve-2023-43757
Vulnerability from cvelistv5
Published
2023-11-16 06:21
Modified
2024-08-02 19:52
Severity ?
EPSS score ?
Summary
Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU94119876/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20210706-01/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20230810-01/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.elecom.co.jp/news/security/20231114-01/ | Third Party Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:10.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "tags": [ "x_transferred" ], "url": "https://www.elecom.co.jp/news/security/20210706-01/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WRC-2533GHBK2-T", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-2533GHBK-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1750GHBK2-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1750GHBK-E", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1750GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1167GHBK2", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-1167GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-F1167ACF", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733GHBK-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733GHBK-C", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-300GHBK2-I", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-300GHBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-733FEBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-300FEBK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRC-F300NF", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH-H", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300BK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300RD", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300SV", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300BK-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300BK2-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-300WH2-S", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-H300BK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-H300WH", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-150BK", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "WRH-150WH", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W300N/RS", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W301NR", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-W300N/P", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-WH300N/DGP", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LAN-WH300NDGPE", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section." } ], "problemTypes": [ { "descriptions": [ { "description": "Inadequate Encryption Strength", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-16T06:42:13.507Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20231114-01/" }, { "url": "https://www.elecom.co.jp/news/security/20230810-01/" }, { "url": "https://www.elecom.co.jp/news/security/20210706-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU94119876/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-43757", "datePublished": "2023-11-16T06:21:13.445Z", "dateReserved": "2023-10-31T07:10:40.728Z", "dateUpdated": "2024-08-02T19:52:10.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-43757\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2023-11-16T07:15:08.600\",\"lastModified\":\"2023-12-01T18:45:24.070\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Inadequate encryption strength vulnerability in multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION allows a network-adjacent unauthenticated attacker to guess the encryption key used for wireless LAN communication and intercept the communication. As for the affected products/versions, see the information provided by the vendor under [References] section.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de fuerza de cifrado inadecuada en m\u00faltiples routers proporcionados por ELECOM CO.,LTD. y LOGITEC CORPORATION permite que un atacante no autenticado adyacente a la red adivine la clave de cifrado utilizada para la comunicaci\u00f3n LAN inal\u00e1mbrica e intercepte la comunicaci\u00f3n. En cuanto a los productos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor en la secci\u00f3n [Referencias].\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-2533ghbk2-t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"416614AE-FE5E-4807-8AB0-618F46E48C4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-2533ghbk2-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"991548FF-6EAD-422F-B2CF-316E96FB7F6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-2533ghbk-i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65FF48A0-3059-4969-9C7D-D12B1E164DE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-2533ghbk-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD11C2A-1EC2-420D-B2AE-FEB67E9866FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-1750ghbk2-i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68DEE867-A37C-4199-BE44-222706725533\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-1750ghbk2-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1EAF366-E7EB-4864-BB1C-16D828141CFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-1750ghbk-e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE44EDE-A5BD-486D-9225-A44BAAB39132\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-1750ghbk-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB8292C-ABDA-4F61-8EF1-D498AE3BF66C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-1750ghbk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E65402-982D-4E0D-A257-806118DBE50A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-1750ghbk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1F1675-60C1-4150-8306-1592F88D3DAC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-1167ghbk2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D00FC11-2C8D-4B88-BB15-157F9C7DBA88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-1167ghbk2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF1D75E-EF09-4BF7-AC5C-F6CDC5B6ED8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-1167ghbk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F2F7444-D3CE-4C5B-B021-4EA615442478\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-1167ghbk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69B25FE-0AF4-49CC-9F10-8F98AFF7CCBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-f1167acf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F558FC-55E4-4DF5-B01D-319A03CE0814\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-f1167acf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C244EA13-D45C-4968-A330-3AD80F588537\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-733ghbk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE82FE52-F2A1-4B9D-B618-7B8D82C497A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-733ghbk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED2A27DD-B40D-4415-8CCE-063427864910\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-733ghbk-i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E9761CF-F0A3-4ACF-B7C0-8BF6EB5F8408\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-733ghbk-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1900274E-7B26-4183-8912-70BCCC306FF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-733ghbk-c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB404C76-CCEB-4242-B602-8A4F93C9F3FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-733ghbk-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED75E24-5232-4CD1-A8D5-96ECCC3C1D17\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-300ghbk2-i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A5AC4E-6AC5-4CF7-ADAC-4DD51ABF1F4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-300ghbk2-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A85134B-286A-472B-B0D2-C4FE7F5B7FC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-300ghbk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17D60C3E-D822-4A09-B9EA-8FBA94DEEC0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-300ghbk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD708BA-8E44-45C9-90A9-2CDA33CFA291\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-733febk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE17625-486F-40E4-9067-07139B69281D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-733febk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2152FA45-F61F-4347-B9B3-992C994D1B64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-300febk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA18046-201B-4009-BE58-B2457DCF206A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-300febk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD07548-B957-4275-BE59-F40940E078A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-f300nf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6278262-98AD-4D51-B368-C8B7C47F4510\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-f300nf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF251645-9505-49CC-BA4D-1CA454D639D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300wh-h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C616FACD-FD5F-4CE3-A196-3447A0D8B5D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300wh-h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"079F2DC5-840A-4201-B46C-F9339968D256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300bk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FF22457-912C-4818-B31E-DCBDF60E6A19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300bk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89ED96E9-D73D-42E7-A86F-7A73E00D2B86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300wh_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D59399A-BE39-4E30-BF0F-8EBADD179279\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300wh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E458D9A1-C2AF-4A8F-AC52-8A9D25C303ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300rd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58DFD59C-AAF4-4B14-A6D5-4CC8D436FDC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300rd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5398598E-4579-44DF-95FB-EBB2871A248E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300sv_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E84D55-C80A-4813-AA15-2E67E1B849C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300sv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4159F7-1DF3-4827-9784-E338CC3E7D93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300bk-s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"221C60DE-F1B0-4284-87DB-EE22B137B16E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300bk-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85EB981B-03EA-49B3-99EA-A8389F795C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300wh-s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"814F1554-9070-4439-BDD0-379596B6710C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300wh-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887859FA-3FA7-40E4-BE7B-977C66CF4E37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300bk2-s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8ABEA4-95AB-4B17-BA47-8FC17B62CB6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300bk2-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476D444E-3A59-4A46-975C-C33AC3F1BB7C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-300wh2-s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E429963F-D7D0-46A0-BD2D-98BD6A9F5348\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-300wh2-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C383661F-19E5-4976-BAC2-1077B67D12A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-h300bk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641FC18A-D8A1-49BB-99D3-C4649B420686\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-h300bk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99341BF6-FD30-421A-9E9C-32C99B6F75AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-h300wh_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AC396-DE39-4BD2-9E0E-46950312ABD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-h300wh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C25CFC-393E-4487-965F-8F922723346F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-150bk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42DDDAA-92A9-4D41-9369-A163D6045B15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-150bk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D11F66F-CEEA-42AB-B1E1-B569FB08B0F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrh-150wh_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378E5102-178F-4C8D-8C0B-CCCF9769A381\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrh-150wh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8082CE-18E8-438F-B953-D5EF1A27FE0B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:lan-w300n\\\\/rs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AAF4C0E-F270-4062-925E-38C65F7280A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:lan-w300n\\\\/rs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0032270C-53E3-4A46-95A8-FDE5DEFDC75C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:lan-w301nr_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE6896F9-6B59-4420-AB70-21B8B84C3B38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:lan-w301nr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A667CE5-0926-4986-B9F6-0F2C23F70FEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:lan-w300n\\\\/p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0376434A-D083-4F7C-9BB1-A9F58F86D3A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:lan-w300n\\\\/p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAD881BC-A228-4402-8A09-5E862B448A62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:lan-wh300n\\\\/dgp_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5C8E61-367D-40AE-B37D-F1CED982DAD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:lan-wh300n\\\\/dgp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B27DECBE-877C-4888-A4B0-C0A65A590640\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:lan-wh300ndgpe_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0870306-5179-4477-8C88-EDFC507ED3D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:lan-wh300ndgpe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72FE6693-2075-4A08-9ACC-4564A36A16BA\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU94119876/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.elecom.co.jp/news/security/20210706-01/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.elecom.co.jp/news/security/20230810-01/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.elecom.co.jp/news/security/20231114-01/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.