VAR-201512-0330
Vulnerability from variot - Updated: 2023-12-18 13:24Buffalo WZR-600DHP2 devices with firmware 2.09, 2.13, and 2.16 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value. Buffalo AirStation Extreme N600 Router WZR-600DHP2, firmware versions 2.09, 2.13, 2.16, and possibly others, uses insufficiently random values for DNS queries and is vulnerable to DNS spoofing attacks. Buffalo Wireless provided by LAN Router WZR-600DHP2 Has the problem of using insufficient random values. Insufficient random value used (CWE-330) - CVE-2015-8262 WZR-600DHP2 Sent from DNS The query source port number is fixed. Also, DNS Used for queries TXID Is 0x0002 It increases gradually and can be predicted from the outside. The attacker DNS By spoofing, LAN It is possible to guide the terminal inside to a malicious server. CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.htmlBy a remote attacker DNS The response is forged, LAN May be directed to a malicious server. Buffalo AirStation Extreme N600 WZR-600DHP2 is a router product of the Buffalo Group in Japan. A security bypass vulnerability exists in the Buffalo AirStation Extreme N600 WZR-600DHP2 Router. An attacker could exploit the vulnerability to bypass security restrictions and gain unauthorized access. This may aid in further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201512-0330",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "airstation extreme n600",
"scope": "eq",
"trust": 1.6,
"vendor": "buffalotech",
"version": "2.13"
},
{
"model": "airstation extreme n600",
"scope": "eq",
"trust": 1.6,
"vendor": "buffalotech",
"version": "2.09"
},
{
"model": "airstation extreme n600",
"scope": "eq",
"trust": 1.6,
"vendor": "buffalotech",
"version": "2.16"
},
{
"model": "airstation extreme n600",
"scope": "eq",
"trust": 1.0,
"vendor": "buffalotech",
"version": "*"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-600dhp2",
"scope": "eq",
"trust": 0.8,
"vendor": "buffalo",
"version": "version 2.09"
},
{
"model": "wzr-600dhp2",
"scope": "eq",
"trust": 0.8,
"vendor": "buffalo",
"version": "version 2.13"
},
{
"model": "wzr-600dhp2",
"scope": "eq",
"trust": 0.8,
"vendor": "buffalo",
"version": "version 2.16"
},
{
"model": "airstation extreme n600 wzr-600dhp2",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": "2.09"
},
{
"model": "airstation extreme n600 wzr-600dhp2",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": "2.13"
},
{
"model": "airstation extreme n600 wzr-600dhp2",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "technology airstation extreme n600 wzr-600dhp2",
"scope": "eq",
"trust": 0.3,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "technology airstation extreme n600 wzr-600dhp2",
"scope": "eq",
"trust": 0.3,
"vendor": "buffalo",
"version": "2.13"
},
{
"model": "technology airstation extreme n600 wzr-600dhp2",
"scope": "eq",
"trust": 0.3,
"vendor": "buffalo",
"version": "2.09"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#646008"
},
{
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"db": "BID",
"id": "78877"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:buffalotech:airstation_extreme_n600_firmware:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:buffalotech:airstation_extreme_n600_firmware:2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:buffalotech:airstation_extreme_n600_firmware:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:buffalotech:airstation_extreme_n600:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8262"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Joel Land of the CERT/CC",
"sources": [
{
"db": "BID",
"id": "78877"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
],
"trust": 0.9
},
"cve": "CVE-2015-8262",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT DEFINED",
"baseScore": 5.0,
"collateralDamagePotential": "NOT DEFINED",
"confidentialityImpact": "NONE",
"confidentialityRequirement": "NOT DEFINED",
"enviromentalScore": 1.1,
"exploitability": "PROOF-OF-CONCEPT",
"exploitabilityScore": 10.0,
"id": "CVE-2015-8262",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT DEFINED",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"remediationLevel": "UNAVAILABLE",
"reportConfidence": "CONFIRMED",
"severity": "MEDIUM",
"targetDistribution": "LOW",
"trust": 0.8,
"userInterationRequired": null,
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2015-8262",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2015-08281",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-86223",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"impactScore": 4.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-8262",
"trust": 2.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2015-08281",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201512-419",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86223",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#646008"
},
{
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"db": "VULHUB",
"id": "VHN-86223"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffalo WZR-600DHP2 devices with firmware 2.09, 2.13, and 2.16 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value. Buffalo AirStation Extreme N600 Router WZR-600DHP2, firmware versions 2.09, 2.13, 2.16, and possibly others, uses insufficiently random values for DNS queries and is vulnerable to DNS spoofing attacks. Buffalo Wireless provided by LAN Router WZR-600DHP2 Has the problem of using insufficient random values. Insufficient random value used (CWE-330) - CVE-2015-8262 WZR-600DHP2 Sent from DNS The query source port number is fixed. Also, DNS Used for queries TXID Is 0x0002 It increases gradually and can be predicted from the outside. The attacker DNS By spoofing, LAN It is possible to guide the terminal inside to a malicious server. CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.htmlBy a remote attacker DNS The response is forged, LAN May be directed to a malicious server. Buffalo AirStation Extreme N600 WZR-600DHP2 is a router product of the Buffalo Group in Japan. A security bypass vulnerability exists in the Buffalo AirStation Extreme N600 WZR-600DHP2 Router. An attacker could exploit the vulnerability to bypass security restrictions and gain unauthorized access. This may aid in further attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"db": "CERT/CC",
"id": "VU#646008"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"db": "BID",
"id": "78877"
},
{
"db": "VULHUB",
"id": "VHN-86223"
}
],
"trust": 3.24
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8262",
"trust": 4.2
},
{
"db": "CERT/CC",
"id": "VU#646008",
"trust": 3.6
},
{
"db": "BID",
"id": "78877",
"trust": 2.6
},
{
"db": "JVN",
"id": "JVNVU93831077",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006309",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201512-419",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-08281",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-86223",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#646008"
},
{
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"db": "VULHUB",
"id": "VHN-86223"
},
{
"db": "BID",
"id": "78877"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
]
},
"id": "VAR-201512-0330",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"db": "VULHUB",
"id": "VHN-86223"
}
],
"trust": 1.310714285
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08281"
}
]
},
"last_update_date": "2023-12-18T13:24:40.228000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "AirStation Extreme N600 Router",
"trust": 0.8,
"url": "http://www.buffalotech.com/products/wireless/dual-band-routers/airstation-extreme-n600-router"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"db": "NVD",
"id": "CVE-2015-8262"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://www.kb.cert.org/vuls/id/646008"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/78877"
},
{
"trust": 0.8,
"url": "http://www.buffalotech.com/products/wireless/dual-band-routers/airstation-extreme-n600-router"
},
{
"trust": 0.8,
"url": "http://www.buffalotech.com/support-and-downloads/download/wzr600dhp2-us-217.zip"
},
{
"trust": 0.8,
"url": "http://www.buffalotech.com/support-and-downloads/download/wzr600dhp2-us-217.txt"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8262"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu93831077/index.html"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8262"
},
{
"trust": 0.3,
"url": "http://www.buffalotech.com/products/wireless/wireless-n-routers-access-points/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#646008"
},
{
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"db": "VULHUB",
"id": "VHN-86223"
},
{
"db": "BID",
"id": "78877"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#646008"
},
{
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"db": "VULHUB",
"id": "VHN-86223"
},
{
"db": "BID",
"id": "78877"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-10T00:00:00",
"db": "CERT/CC",
"id": "VU#646008"
},
{
"date": "2015-12-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"date": "2015-12-27T00:00:00",
"db": "VULHUB",
"id": "VHN-86223"
},
{
"date": "2015-12-10T00:00:00",
"db": "BID",
"id": "78877"
},
{
"date": "2015-12-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"date": "2015-12-27T03:59:04.973000",
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"date": "2015-12-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-01-25T00:00:00",
"db": "CERT/CC",
"id": "VU#646008"
},
{
"date": "2015-12-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08281"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-86223"
},
{
"date": "2015-12-10T00:00:00",
"db": "BID",
"id": "78877"
},
{
"date": "2016-01-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006309"
},
{
"date": "2016-11-28T19:46:14.217000",
"db": "NVD",
"id": "CVE-2015-8262"
},
{
"date": "2015-12-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffalo AirStation Extreme N600 Router WZR-600DHP2 uses insufficiently random values for DNS queries",
"sources": [
{
"db": "CERT/CC",
"id": "VU#646008"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-419"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.