cve-2024-50357
Vulnerability from cvelistv5
Published
2024-11-29 09:06
Modified
2024-12-02 18:15
Severity ?
EPSS score ?
Summary
FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled. The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. As a result, an attacker may obtain and/or alter the affected product's settings via REST-APIs.
References
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Century Systems Co., Ltd. | FutureNet NXR-G110 series |
Version: firmware versions 21.15.7 and later but prior to 21.15.9 |
||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:centurysys:futurenet_nxr-g110_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "futurenet_nxr-g110_firmware", "vendor": "centurysys", "versions": [ { "lessThan": "21.15.9", "status": "affected", "version": "21.15.7", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:centurysys:futurenet_nxr-g060_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "futurenet_nxr-g060_firmware", "vendor": "centurysys", "versions": [ { "lessThan": "21.15.6C1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:centurysys:futurenet_nxr-g050_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "futurenet_nxr-g050_firmware", "vendor": "centurysys", "versions": [ { "lessThan": "21.12.11", "status": "affected", "version": "21.12.5", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-50357", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T13:27:09.092320Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T18:15:27.594Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FutureNet NXR-G110 series", "vendor": "Century Systems Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware versions 21.15.7 and later but prior to 21.15.9" } ] }, { "product": "FutureNet NXR-G060 series", "vendor": "Century Systems Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware versions prior to 21.15.6C1" } ] }, { "product": "FutureNet NXR-G050 series", "vendor": "Century Systems Co., Ltd.", "versions": [ { "status": "affected", "version": "firmware versions 21.12.5 and later but prior to 21.12.11" } ] } ], "descriptions": [ { "lang": "en", "value": "FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled. The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. As a result, an attacker may obtain and/or alter the affected product\u0027s settings via REST-APIs." } ], "metrics": [ { "cvssV3_0": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-684", "description": "Incorrect provision of specified functionality", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-29T09:06:56.251Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20241031-01.html" }, { "url": "https://jvn.jp/en/vu/JVNVU95001899/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-50357", "datePublished": "2024-11-29T09:06:56.251Z", "dateReserved": "2024-10-23T04:47:33.910Z", "dateUpdated": "2024-12-02T18:15:27.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-50357\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-11-29T10:15:10.833\",\"lastModified\":\"2024-11-29T10:15:10.833\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled. The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. As a result, an attacker may obtain and/or alter the affected product\u0027s settings via REST-APIs.\"},{\"lang\":\"es\",\"value\":\"Los enrutadores de la serie FutureNet NXR proporcionados por Century Systems Co., Ltd. tienen API REST, que est\u00e1n configuradas como deshabilitadas en la configuraci\u00f3n inicial (predeterminada de f\u00e1brica). Sin embargo, las API REST se habilitan inesperadamente cuando se enciende el producto afectado, siempre que est\u00e9 habilitada la autenticaci\u00f3n web o del servidor http (GUI). La configuraci\u00f3n predeterminada de f\u00e1brica habilita el servidor http (GUI), lo que significa que las API REST tambi\u00e9n est\u00e1n habilitadas. El nombre de usuario y la contrase\u00f1a para las API REST est\u00e1n configurados en la configuraci\u00f3n predeterminada de f\u00e1brica. Como resultado, un atacante puede obtener y/o alterar la configuraci\u00f3n del producto afectado a trav\u00e9s de las API REST.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-684\"}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU95001899/\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.centurysys.co.jp/backnumber/nxr_common/20241031-01.html\",\"source\":\"vultures@jpcert.or.jp\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.