FKIE_CVE-2024-50357
Vulnerability from fkie_nvd - Published: 2024-11-29 10:15 - Updated: 2024-11-29 10:15
Severity ?
Summary
FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled. The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. As a result, an attacker may obtain and/or alter the affected product's settings via REST-APIs.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled. The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. As a result, an attacker may obtain and/or alter the affected product\u0027s settings via REST-APIs."
},
{
"lang": "es",
"value": "Los enrutadores de la serie FutureNet NXR proporcionados por Century Systems Co., Ltd. tienen API REST, que est\u00e1n configuradas como deshabilitadas en la configuraci\u00f3n inicial (predeterminada de f\u00e1brica). Sin embargo, las API REST se habilitan inesperadamente cuando se enciende el producto afectado, siempre que est\u00e9 habilitada la autenticaci\u00f3n web o del servidor http (GUI). La configuraci\u00f3n predeterminada de f\u00e1brica habilita el servidor http (GUI), lo que significa que las API REST tambi\u00e9n est\u00e1n habilitadas. El nombre de usuario y la contrase\u00f1a para las API REST est\u00e1n configurados en la configuraci\u00f3n predeterminada de f\u00e1brica. Como resultado, un atacante puede obtener y/o alterar la configuraci\u00f3n del producto afectado a trav\u00e9s de las API REST."
}
],
"id": "CVE-2024-50357",
"lastModified": "2024-11-29T10:15:10.833",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "vultures@jpcert.or.jp",
"type": "Secondary"
}
]
},
"published": "2024-11-29T10:15:10.833",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "https://jvn.jp/en/vu/JVNVU95001899/"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20241031-01.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-684"
}
],
"source": "vultures@jpcert.or.jp",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…