cve-2024-22366
Vulnerability from cvelistv5
Published
2024-01-24 04:35
Modified
2024-08-01 22:43
Severity ?
Summary
Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:43:34.585Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU99896362/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WLX222",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.24.00.03 and earlier"
            }
          ]
        },
        {
          "product": "WLX413",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.22.00.05 and earlier"
            }
          ]
        },
        {
          "product": "WLX212",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.21.00.12 and earlier"
            }
          ]
        },
        {
          "product": "WLX313",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.18.00.12 and earlier"
            }
          ]
        },
        {
          "product": "WLX202",
          "vendor": "Yamaha Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "firmware Rev.16.00.18 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device\u0027s management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Active debug code",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-24T04:35:55.337Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU99896362/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2024-22366",
    "datePublished": "2024-01-24T04:35:55.337Z",
    "dateReserved": "2024-01-09T07:04:26.494Z",
    "dateUpdated": "2024-08-01T22:43:34.585Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-22366\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-01-24T05:15:13.823\",\"lastModified\":\"2024-01-30T22:15:32.033\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device\u0027s management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.\"},{\"lang\":\"es\",\"value\":\"Existe un c\u00f3digo de depuraci\u00f3n activo en los dispositivos de punto de acceso a LAN inal\u00e1mbrica de Yamaha. Si un usuario que ha iniciado sesi\u00f3n y sabe c\u00f3mo utilizar la funci\u00f3n de depuraci\u00f3n accede a la p\u00e1gina de administraci\u00f3n del dispositivo, esta funci\u00f3n se puede habilitar realizando operaciones espec\u00edficas. Como resultado, se puede ejecutar un comando arbitrario del sistema operativo y/o se pueden alterar los ajustes de configuraci\u00f3n del dispositivo. Los productos y versiones afectados son los siguientes: firmware WLX222 Rev.24.00.03 y anteriores, firmware WLX413 Rev.22.00.05 y anteriores, firmware WLX212 Rev.21.00.12 y anteriores, firmware WLX313 Rev.18.00.12 y anteriores, y WLX202 firmware Rev.16.00.18 y anteriores.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:yamaha:wlx222_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"24.00.04\",\"matchCriteriaId\":\"70856555-1E43-41CF-8703-E275C324C11D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:yamaha:wlx222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED9A76F-D05F-4AEB-8074-A4D537776463\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:yamaha:wlx413_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.00.06\",\"matchCriteriaId\":\"A13D6C91-1FD0-4C34-8B8E-B267EC158675\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:yamaha:wlx413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F38F22-188D-4024-BC93-A6F5B50FCD07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:yamaha:wlx212_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.00.13\",\"matchCriteriaId\":\"286E914E-E498-453E-9153-4CFF24447050\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:yamaha:wlx212:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C7ADB6-B1EE-4F30-87C8-2BA683B97D9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:yamaha:wlx313_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.00.13\",\"matchCriteriaId\":\"F1927743-73D4-4642-83A7-CCB4379A9E1E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:yamaha:wlx313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2EAA17-C6D9-4C84-BCD4-F0599035F4E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:yamaha:wlx202_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.00.19\",\"matchCriteriaId\":\"4000DA8E-6E03-470E-BC61-82504C51D5A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:yamaha:wlx202:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFE472D-2EF8-4AB5-B482-5279B3F5EFAB\"}]}]}],\"references\":[{\"url\":\"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/vu/JVNVU99896362/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.