Vulnerabilites related to nec - atermwr9500n
CVE-2013-0717 (GCVE-0-2013-0717)
Vulnerability from cvelistv5
Published
2013-03-19 18:00
Modified
2024-09-17 02:51
Severity ?
CWE
  • n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device.
References
http://jvn.jp/en/jp/JVN59503133/6443/index.htmlx_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024third-party-advisory, x_refsource_JVNDB
http://jpn.nec.com/security-info/secinfo/nv13-005.htmlx_refsource_CONFIRM
http://jvn.jp/en/jp/JVN59503133/index.htmlthird-party-advisory, x_refsource_JVN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:33:05.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
          },
          {
            "name": "JVNDB-2013-000024",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
          },
          {
            "name": "JVN#59503133",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN59503133/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-19T18:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
        },
        {
          "name": "JVNDB-2013-000024",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
        },
        {
          "name": "JVN#59503133",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN59503133/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-0717",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://jvn.jp/en/jp/JVN59503133/6443/index.html",
              "refsource": "CONFIRM",
              "url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
            },
            {
              "name": "JVNDB-2013-000024",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
            },
            {
              "name": "http://jpn.nec.com/security-info/secinfo/nv13-005.html",
              "refsource": "CONFIRM",
              "url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
            },
            {
              "name": "JVN#59503133",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN59503133/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-0717",
    "datePublished": "2013-03-19T18:00:00Z",
    "dateReserved": "2012-12-28T00:00:00Z",
    "dateUpdated": "2024-09-17T02:51:50.999Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-03-19 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nec:atermwm3450rn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2214321D-ABC8-4FFD-BF33-E1F707386DD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:nec:atermwm3600r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5040C6-5035-46CF-A80C-E2D69A5E3401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:nec:atermwr8160n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D01D2D-ABD8-47C7-8070-41608AE59DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:nec:atermwr8370n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20AB6685-5F0E-46E9-8776-2FBF8ACE8DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:nec:atermwr8600n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56589FA6-6A4E-4D47-83BE-9E246E722202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:nec:atermwr9500n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC88A006-8AB5-4780-8280-676B34BFE7F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades CSRF en la utilidad de gesti\u00f3n web de los enrutadores NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, y AtermWM3450RN, permite a los atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para peticiones que (1)inicializan opciones o (2) reinician el dispositivo."
    }
  ],
  "id": "CVE-2013-0717",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-03-19T18:55:03.347",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN59503133/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN59503133/6443/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN59503133/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000024"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-201303-0238
Vulnerability from variot

Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device. Sen UENO of Tricorder Co. Ltd., Hiroshi Kumagai and Kimura Youichi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, settings of the product may be initialized, or the product may be rebooted. NEC aterm is a number of wireless routing devices. Because the application allows users to perform certain operations through HTTP requests without performing any validity check, the attacker can exploit the vulnerability to perform specific operations when the logged-in administrator accesses a malicious website. action. Exploiting these issues may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201303-0238",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "atermwm3600r",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr8160n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr9500n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr8370n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr8600n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwm3450rn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wm3450rn",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wm3600r",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wr8160n",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wr8170n",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wr8370n",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wr8600n",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wr8700n",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "aterm wr9500n",
        "scope": null,
        "trust": 0.8,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr9500n router",
        "scope": null,
        "trust": 0.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr8600n router",
        "scope": null,
        "trust": 0.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr8370n router",
        "scope": null,
        "trust": 0.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr8160n router",
        "scope": null,
        "trust": 0.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwm3600r router",
        "scope": null,
        "trust": 0.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwm3450rn router",
        "scope": null,
        "trust": 0.6,
        "vendor": "nec",
        "version": null
      },
      {
        "model": "atermwr9500n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwr8600n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwr8370n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwr8160n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwm3600r",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwm3450rn",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwr9300n",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwr8750n",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwr8175n",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      },
      {
        "model": "atermwm3800r",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "nec",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "db": "BID",
        "id": "58625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:nec:atermwm3450rn",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:atermwm3600r",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:atermwr8160n",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:atermwr8170n",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:atermwr8370n",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:atermwr8600n",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:atermwr8700n",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:atermwr9500n",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sen UENO of Tricorder Co. Ltd, Hiroshi Kumagai and Kimura Youichi",
    "sources": [
      {
        "db": "BID",
        "id": "58625"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-0717",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-0717",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 4.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-000024",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 4.9,
            "id": "CNVD-2013-01929",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-0717",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2013-000024",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-01929",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201303-390",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web-based management utility on the NEC AtermWR9500N, AtermWR8600N, AtermWR8370N, AtermWR8160N, AtermWM3600R, and AtermWM3450RN routers allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device. Sen UENO of Tricorder Co. Ltd., Hiroshi Kumagai and Kimura Youichi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, settings of the product may be initialized, or the product may be rebooted. NEC aterm is a number of wireless routing devices. Because the application allows users to perform certain operations through HTTP requests without performing any validity check, the attacker can exploit the vulnerability to perform specific operations when the logged-in administrator accesses a malicious website. action. \nExploiting these issues may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-0717"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "db": "BID",
        "id": "58625"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024",
        "trust": 3.3
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0717",
        "trust": 3.3
      },
      {
        "db": "JVN",
        "id": "JVN59503133",
        "trust": 2.7
      },
      {
        "db": "SECUNIA",
        "id": "52666",
        "trust": 1.2
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#59503133",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "58625",
        "trust": 0.3
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "db": "BID",
        "id": "58625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "id": "VAR-201303-0238",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:12:49.849000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "NV13-005",
        "trust": 0.8,
        "url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
      },
      {
        "title": "NEC multiple aterm router cross-site request forgery vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/32961"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.7,
        "url": "http://jvn.jp/en/jp/jvn59503133/index.html"
      },
      {
        "trust": 1.9,
        "url": "http://jpn.nec.com/security-info/secinfo/nv13-005.html"
      },
      {
        "trust": 1.6,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000024"
      },
      {
        "trust": 1.6,
        "url": "http://jvn.jp/en/jp/jvn59503133/6443/index.html"
      },
      {
        "trust": 0.9,
        "url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000024.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0717"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0717"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/52666/"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/52666"
      },
      {
        "trust": 0.3,
        "url": "http://jpn.nec.com/index.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "db": "BID",
        "id": "58625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "db": "BID",
        "id": "58625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-03-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "date": "2013-03-19T00:00:00",
        "db": "BID",
        "id": "58625"
      },
      {
        "date": "2013-03-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "date": "2013-03-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      },
      {
        "date": "2013-03-19T18:55:03.347000",
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-03-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-01929"
      },
      {
        "date": "2013-03-19T00:00:00",
        "db": "BID",
        "id": "58625"
      },
      {
        "date": "2013-06-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      },
      {
        "date": "2013-03-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      },
      {
        "date": "2024-11-21T01:48:03.537000",
        "db": "NVD",
        "id": "CVE-2013-0717"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple NEC mobile routers vulnerable to cross-site request forgery",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000024"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-390"
      }
    ],
    "trust": 0.6
  }
}