VAR-201607-0312

Vulnerability from variot - Updated: 2023-12-18 13:39

Cross-site request forgery (CSRF) vulnerability on NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allows remote attackers to hijack the authentication of arbitrary users. Ryoya Tsukasaki of Urawa Commercial High School reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, unintended operations may be performed. NTTHikariDenwaPR-400MI, RV-440MI and RT-400MI are all router products of Japan Telecom Telephone (NTT). An attacker could exploit the vulnerability to perform unauthorized actions. This may aid in other attacks. The following products and versions are affected: NTT Hikari Denwa PR-400MI, RV-440MI, RT-400MI using firmware version 07.00.1006 and earlier, Hikari Denwa PR-400MI, RV-440MI, RT using firmware version 07.00.1005 and earlier -400MI

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201607-0312",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "pr-400mi",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ntt east",
        "version": "07.00.1006"
      },
      {
        "model": "pr-400mi",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ntt west",
        "version": "07.00.1005"
      },
      {
        "model": "rt-400mi",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ntt east",
        "version": "07.00.1006"
      },
      {
        "model": "rt-400mi",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ntt west",
        "version": "07.00.1005"
      },
      {
        "model": "rv-440mi",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ntt west",
        "version": "07.00.1005"
      },
      {
        "model": "pr-400mi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ntt west",
        "version": null
      },
      {
        "model": "rv-440mi",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ntt east",
        "version": "07.00.1006"
      },
      {
        "model": "pr-400mi",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "nippon telegraph and telephone east",
        "version": "ver. 07.00.1006"
      },
      {
        "model": "rt-400mi",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "nippon telegraph and telephone east",
        "version": "ver. 07.00.1006"
      },
      {
        "model": "rv-440mi",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "nippon telegraph and telephone east",
        "version": "ver. 07.00.1006"
      },
      {
        "model": "pr-400mi",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "nippon telegraph and telephone west",
        "version": "ver. 07.00.1005"
      },
      {
        "model": "rt-400mi",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "nippon telegraph and telephone west",
        "version": "ver. 07.00.1005"
      },
      {
        "model": "rv-440mi",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "nippon telegraph and telephone west",
        "version": "ver. 07.00.1005"
      },
      {
        "model": "hikari denwa rt-400mi",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "nippon telegraph and telephone",
        "version": "\u003c=07.00.1006"
      },
      {
        "model": "hikari denwa rt-400mi",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "nippon telegraph and telephone",
        "version": "\u003c=07.00.1005"
      },
      {
        "model": "hikari denwa rv-440m",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "nippon telegraph and telephone",
        "version": "\u003c=07.00.1005"
      },
      {
        "model": "hikari denwa rv-440m",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "nippon telegraph and telephone",
        "version": "\u003c=07.00.1006"
      },
      {
        "model": "hikari denwa pr-400mi",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "nippon telegraph and telephone",
        "version": "\u003c=07.00.1005"
      },
      {
        "model": "hikari denwa pr-400mi",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "nippon telegraph and telephone",
        "version": "\u003c=07.00.1006"
      },
      {
        "model": "rv-440mi",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ntt east",
        "version": "07.00.1006"
      },
      {
        "model": "rt-400mi",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ntt east",
        "version": "07.00.1006"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:ntt-west:pr-400mi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "07.00.1005",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:ntt-west:pr-400mi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:ntt-west:rt-400mi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "07.00.1005",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:ntt-west:rt-400mi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:ntt-west:rv-440mi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "07.00.1005",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:ntt-west:rv-440mi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:ntt-east:pr-400mi_firmware:07.00.1006:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:ntt-east:pr-400mi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:ntt-east:rt-400mi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "07.00.1006",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:ntt-east:rt-400mi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:ntt-east:rv-440mi_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "07.00.1006",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:ntt-east:rv-440mi:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ryoya Tsukasaki of Urawa Commercial High School",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2016-1228",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000106",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CNVD-2016-04402",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-90047",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 7.1,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-000106",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-1228",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2016-000106",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-04402",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201606-604",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-90047",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "VULHUB",
        "id": "VHN-90047"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability on NTT EAST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1006 and earlier and NTT WEST Hikari Denwa routers with firmware PR-400MI, RT-400MI, and RV-440MI 07.00.1005 and earlier allows remote attackers to hijack the authentication of arbitrary users. Ryoya Tsukasaki of Urawa Commercial High School reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, unintended operations may be performed. NTTHikariDenwaPR-400MI, RV-440MI and RT-400MI are all router products of Japan Telecom Telephone (NTT). An attacker could exploit the vulnerability to perform unauthorized actions. This may aid in other attacks. The following products and versions are affected: NTT Hikari Denwa PR-400MI, RV-440MI, RT-400MI using firmware version 07.00.1006 and earlier, Hikari Denwa PR-400MI, RV-440MI, RT using firmware version 07.00.1005 and earlier -400MI",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "BID",
        "id": "91462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-90047"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-1228",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVN45034304",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106",
        "trust": 3.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "91462",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-90047",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "VULHUB",
        "id": "VHN-90047"
      },
      {
        "db": "BID",
        "id": "91462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "id": "VAR-201607-0312",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "VULHUB",
        "id": "VHN-90047"
      }
    ],
    "trust": 0.06999999999999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:39:10.633000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION website",
        "trust": 0.8,
        "url": "http://web116.jp/ced/support/news/contents/2016/20160627.html"
      },
      {
        "title": "NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION website",
        "trust": 0.8,
        "url": "http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html"
      },
      {
        "title": "Patches for multiple NTTHikariDenwa products across site request forgery vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/78396"
      },
      {
        "title": "Multiple NTT Hikari Denwa Repair measures for product cross-site request forgery vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62513"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-90047"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://jvn.jp/en/jp/jvn45034304/index.html"
      },
      {
        "trust": 2.3,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2016-000106"
      },
      {
        "trust": 1.7,
        "url": "http://web116.jp/ced/support/news/contents/2016/20160627.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.ntt-west.co.jp/kiki/support/flets/hgw4_mi/160627.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1228"
      },
      {
        "trust": 0.8,
        "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1228"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "VULHUB",
        "id": "VHN-90047"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "db": "VULHUB",
        "id": "VHN-90047"
      },
      {
        "db": "BID",
        "id": "91462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-07-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "date": "2016-07-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-90047"
      },
      {
        "date": "2016-06-27T00:00:00",
        "db": "BID",
        "id": "91462"
      },
      {
        "date": "2016-06-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "date": "2016-07-03T14:59:02.587000",
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "date": "2016-06-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-07-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04402"
      },
      {
        "date": "2016-07-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-90047"
      },
      {
        "date": "2016-07-06T15:06:00",
        "db": "BID",
        "id": "91462"
      },
      {
        "date": "2016-08-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      },
      {
        "date": "2021-07-30T15:25:10.287000",
        "db": "NVD",
        "id": "CVE-2016-1228"
      },
      {
        "date": "2021-08-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Hikari Denwa routers vulnerable to cross-site request forgery",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-000106"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-604"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…