var-200801-0148
Vulnerability from variot

Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors. Multiple Yamaha routers provide a web-based interface for users to configure the settings of the routers. The web interface is vulnerable to cross-site request forgery.If the administrator views a malicious website while logged onto the web interface, the password and other configuration settings can be modified. Exploiting this issue may allow a remote attacker to execute arbitrary actions on an affected device. Yamaha routers in the RT and SRT series are vulnerable.

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.

The vulnerability is caused due to the device allowing users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to e.g. change the administrator password by enticing a logged-in administrator to visit a malicious site.

Please see the vendor's advisory for a list of affected models.

SOLUTION: Update to the latest firmware versions. Please see the vendor's advisory for details.

Do not browse untrusted websites or follow untrusted links while logged on to the device.

PROVIDED AND/OR DISCOVERED BY: Reported via JVN.

ORIGINAL ADVISORY: Yamaha Corporation: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html

JVN#88575577: http://jvn.jp/jp/JVN%2388575577/index.html

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200801-0148",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rt58i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rt80i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rt52pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rt107e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rta50i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rta52i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rtx1500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rt60w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rta54i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rt57i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rtv700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rtx1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "srt100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rta55i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rtw65b",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rt56v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rtw65i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rtx1100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "yamaha",
        "version": "*"
      },
      {
        "model": "rtx1500",
        "scope": null,
        "trust": 0.9,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rtx1100",
        "scope": null,
        "trust": 0.9,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rtx1000",
        "scope": null,
        "trust": 0.9,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rtv700",
        "scope": null,
        "trust": 0.9,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "1000"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "107e"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "1100"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "1500"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "55i"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "57i"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "58i"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "sr100"
      },
      {
        "model": "ip38x series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "v700"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rt56v"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rt57i"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rt58i"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rt60w"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rt80i"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rta50i"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rta52i"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rta54i"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rta55i"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rtw65b"
      },
      {
        "model": "netvolante series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rtw65i"
      },
      {
        "model": "rt series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rt107e"
      },
      {
        "model": "rtv series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rtv01"
      },
      {
        "model": "rtv series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rtv700"
      },
      {
        "model": "rtx series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rtx1000"
      },
      {
        "model": "rtx series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rtx1100"
      },
      {
        "model": "rtx series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "rtx1500"
      },
      {
        "model": "srt series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "yamaha",
        "version": "srt100"
      },
      {
        "model": "rtw65i",
        "scope": null,
        "trust": 0.6,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rta54i",
        "scope": null,
        "trust": 0.6,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "srt100",
        "scope": null,
        "trust": 0.6,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rta52i",
        "scope": null,
        "trust": 0.6,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rta50i",
        "scope": null,
        "trust": 0.6,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rtw65b",
        "scope": null,
        "trust": 0.6,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "srt100",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rtw65i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rtw65b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rta55i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rta54i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rta52i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rta50i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rt80i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rt60w",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rt58i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rt57i",
        "scope": null,
        "trust": 0.3,
        "vendor": "yamaha",
        "version": null
      },
      {
        "model": "rt56v",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rt52pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      },
      {
        "model": "rt107e",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "yamaha",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "27491"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rt52pro:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rt56v:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rta55i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rtv700:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rt57i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rt58i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rt60w:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rtw65b:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rtw65i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rt107e:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rta52i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rta54i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rtx1500:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:srt100:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rt80i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rta50i:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rtx1000:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:yamaha:rtx1100:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JPCERT/CC",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-0524",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": true,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 4.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2008-000005",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:H/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-30649",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2008-0524",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2008-000005",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200801-468",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-30649",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors. Multiple Yamaha routers provide a web-based interface for users to configure the settings of the routers. The web interface is vulnerable to cross-site request forgery.If the administrator views a malicious website while logged onto the web interface, the password and other configuration settings can be modified. \nExploiting this issue may allow a remote attacker to execute arbitrary actions on an affected device. \nYamaha routers in the RT and SRT series are vulnerable. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nThe vulnerability is caused due to the device allowing users to\nperform certain actions via HTTP requests without performing any\nvalidity checks to verify the request. This can be exploited to e.g. \nchange the administrator password by enticing a logged-in\nadministrator to visit a malicious site. \n\nPlease see the vendor\u0027s advisory for a list of affected models. \n\nSOLUTION:\nUpdate to the latest firmware versions. Please see the vendor\u0027s\nadvisory for details. \n\nDo not browse untrusted websites or follow untrusted links while\nlogged on to the device. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported via JVN. \n\nORIGINAL ADVISORY:\nYamaha Corporation:\nhttp://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html\n\nJVN#88575577:\nhttp://jvn.jp/jp/JVN%2388575577/index.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "db": "BID",
        "id": "27491"
      },
      {
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "db": "PACKETSTORM",
        "id": "63075"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN88575577",
        "trust": 2.9
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0524",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "27491",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "28690",
        "trust": 2.7
      },
      {
        "db": "XF",
        "id": "40015",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#88575577",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-30649",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "63075",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "db": "BID",
        "id": "27491"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "db": "PACKETSTORM",
        "id": "63075"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ]
  },
  "id": "VAR-200801-0148",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30649"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:58:55.307000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "NV08-001",
        "trust": 0.8,
        "url": "http://www.nec.co.jp/security-info/secinfo/nv08-001.html"
      },
      {
        "title": "JVN88575577",
        "trust": 0.8,
        "url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/jvn88575577.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/27491"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/28690"
      },
      {
        "trust": 2.1,
        "url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/jvn88575577.html"
      },
      {
        "trust": 2.1,
        "url": "http://jvn.jp/jp/jvn%2388575577/index.html"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/40015"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40015"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0524"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/english/vuln/200801_yamaha_press_en.html"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/en/jp/jvn88575577/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0524"
      },
      {
        "trust": 0.3,
        "url": "http://www.ipa.go.jp/security/vuln/documents/2008/200801_yamaha.html"
      },
      {
        "trust": 0.3,
        "url": "http://jvndb.jvn.jp/contents/ja/2008/jvndb-2008-000005.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/?page=changelog"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/17358/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28690/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "db": "BID",
        "id": "27491"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "db": "PACKETSTORM",
        "id": "63075"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "db": "BID",
        "id": "27491"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "db": "PACKETSTORM",
        "id": "63075"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-01-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "date": "2008-01-29T00:00:00",
        "db": "BID",
        "id": "27491"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "date": "2008-01-30T02:17:24",
        "db": "PACKETSTORM",
        "id": "63075"
      },
      {
        "date": "2008-01-31T20:00:00",
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "date": "2008-01-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-30649"
      },
      {
        "date": "2015-05-07T17:33:00",
        "db": "BID",
        "id": "27491"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      },
      {
        "date": "2017-08-08T01:29:37.337000",
        "db": "NVD",
        "id": "CVE-2008-0524"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Yamaha routers vulnerable to cross-site request forgery",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-000005"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200801-468"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.