Vulnerabilites related to aterm - wg2600hp2
CVE-2021-20621 (GCVE-0-2021-20621)
Vulnerability from cvelistv5
- Cross-site request forgery
▼ | URL | Tags |
---|---|---|
https://www.aterm.jp/support/tech/2019/0328.html | x_refsource_MISC | |
https://jpn.nec.com/security-info/secinfo/nv21-005.html | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN38248512/index.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
NEC Corporation | Aterm WG2600HP and Aterm WG2600HP2 |
Version: Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:44.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Aterm WG2600HP and Aterm WG2600HP2", "vendor": "NEC Corporation", "versions": [ { "status": "affected", "version": "Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site request forgery", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-28T10:00:29", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20621", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Aterm WG2600HP and Aterm WG2600HP2", "version": { "version_data": [ { "version_value": "Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier" } ] } } ] }, "vendor_name": "NEC Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site request forgery" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.aterm.jp/support/tech/2019/0328.html", "refsource": "MISC", "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "name": "https://jpn.nec.com/security-info/secinfo/nv21-005.html", "refsource": "MISC", "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "name": "https://jvn.jp/en/jp/JVN38248512/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN38248512/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20621", "datePublished": "2021-01-28T10:00:29", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:45:44.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12575 (GCVE-0-2017-12575)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2018/Aug/26 | mailing-list, x_refsource_FULLDISC | |
http://jvn.jp/en/jp/JVN38248512/index.html | third-party-advisory, x_refsource_JVN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20180821 CVE-2017-12575: information leakage in NEC Aterm WG2600HP2", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/26" }, { "name": "JVN#38248512", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN38248512/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don\u0027t require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d \"REQ_ID=SUPPORT_IF_GET\")." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-22T06:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20180821 CVE-2017-12575: information leakage in NEC Aterm WG2600HP2", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/26" }, { "name": "JVN#38248512", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN38248512/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12575", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don\u0027t require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d \"REQ_ID=SUPPORT_IF_GET\")." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20180821 CVE-2017-12575: information leakage in NEC Aterm WG2600HP2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Aug/26" }, { "name": "JVN#38248512", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN38248512/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12575", "datePublished": "2018-08-24T19:00:00", "dateReserved": "2017-08-05T00:00:00", "dateUpdated": "2024-08-05T18:43:56.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-20622 (GCVE-0-2021-20622)
Vulnerability from cvelistv5
- Cross-site scripting
▼ | URL | Tags |
---|---|---|
https://www.aterm.jp/support/tech/2019/0328.html | x_refsource_MISC | |
https://jpn.nec.com/security-info/secinfo/nv21-005.html | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN38248512/index.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
NEC Corporation | Aterm WG2600HP and Aterm WG2600HP2 |
Version: Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:44.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Aterm WG2600HP and Aterm WG2600HP2", "vendor": "NEC Corporation", "versions": [ { "status": "affected", "version": "Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-28T10:00:29", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20622", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Aterm WG2600HP and Aterm WG2600HP2", "version": { "version_data": [ { "version_value": "Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier" } ] } } ] }, "vendor_name": "NEC Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.aterm.jp/support/tech/2019/0328.html", "refsource": "MISC", "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "name": "https://jpn.nec.com/security-info/secinfo/nv21-005.html", "refsource": "MISC", "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "name": "https://jvn.jp/en/jp/JVN38248512/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN38248512/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20622", "datePublished": "2021-01-28T10:00:29", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:45:44.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jpn.nec.com/security-info/secinfo/nv21-005.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN38248512/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.aterm.jp/support/tech/2019/0328.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jpn.nec.com/security-info/secinfo/nv21-005.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN38248512/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.aterm.jp/support/tech/2019/0328.html | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
aterm | wg2600hp_firmware | * | |
aterm | wg2600hp | - | |
aterm | wg2600hp2_firmware | * | |
aterm | wg2600hp2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aterm:wg2600hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28520885-3EFD-483A-9304-7C6654DAE4D1", "versionEndIncluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aterm:wg2600hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F004958D-AEE0-4F45-BE7D-1B23012BB165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aterm:wg2600hp2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A025B5DB-64C5-4DF3-9C29-898E5039A642", "versionEndIncluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aterm:wg2600hp2:-:*:*:*:*:*:*:*", "matchCriteriaId": "261CC711-5970-41E2-89C9-A964453ABECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de tipo Cross-site request forgery (CSRF) en Aterm WG2600HP firmware versiones 1.0.2 y anteriores, y Aterm WG2600HP2 firmware versiones 1.0.2 y anteriores, permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores por medio de vectores no especificados" } ], "id": "CVE-2021-20621", "lastModified": "2024-11-21T05:46:53.613", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-28T11:15:13.793", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN38248512/index.html | ||
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Aug/26 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN38248512/index.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Aug/26 | Mailing List, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
aterm | wg2600hp2_firmware | 1.0.2 | |
aterm | wg2600hp2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aterm:wg2600hp2_firmware:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "082FA530-D838-435C-9063-FEE69190367A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aterm:wg2600hp2:-:*:*:*:*:*:*:*", "matchCriteriaId": "261CC711-5970-41E2-89C9-A964453ABECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don\u0027t require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d \"REQ_ID=SUPPORT_IF_GET\")." }, { "lang": "es", "value": "Se ha descubierto un error en NEC Aterm WG2600HP2 1.0.2. El router tiene una serie de API del servicio web para acceder y configurar las opciones. Algunas API no requieren autenticaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTP manipulada para recuperar clientes DHCP, la versi\u00f3n del firmware y el estado de red (ej.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d \"REQ_ID=SUPPORT_IF_GET\")." } ], "id": "CVE-2017-12575", "lastModified": "2024-11-21T03:09:47.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-24T19:29:00.800", "references": [ { "source": "cve@mitre.org", "url": "http://jvn.jp/en/jp/JVN38248512/index.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN38248512/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/26" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jpn.nec.com/security-info/secinfo/nv21-005.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN38248512/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.aterm.jp/support/tech/2019/0328.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jpn.nec.com/security-info/secinfo/nv21-005.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN38248512/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.aterm.jp/support/tech/2019/0328.html | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
aterm | wg2600hp_firmware | * | |
aterm | wg2600hp | - | |
aterm | wg2600hp2_firmware | * | |
aterm | wg2600hp2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aterm:wg2600hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28520885-3EFD-483A-9304-7C6654DAE4D1", "versionEndIncluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aterm:wg2600hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F004958D-AEE0-4F45-BE7D-1B23012BB165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aterm:wg2600hp2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A025B5DB-64C5-4DF3-9C29-898E5039A642", "versionEndIncluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aterm:wg2600hp2:-:*:*:*:*:*:*:*", "matchCriteriaId": "261CC711-5970-41E2-89C9-A964453ABECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de tipo Cross-site scripting en Aterm WG2600HP firmware versiones 1.0.2 y anteriores, y Aterm WG2600HP2 firmware versiones 1.0.2 y anteriores, permite a atacantes remotos inyectar un script arbitrario por medio de vectores no especificados" } ], "id": "CVE-2021-20622", "lastModified": "2024-11-21T05:46:53.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-28T11:15:13.857", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN38248512/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.aterm.jp/support/tech/2019/0328.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201808-0125
Vulnerability from variot
An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don't require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d "REQ_ID=SUPPORT_IF_GET"). NEC Aterm WG2600HP2 Contains an access control vulnerability.Information may be obtained. The WG2600HP2 is a router product from NEC. A security vulnerability exists in NEC Aterm WG2600HP2 version 1.0.2
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201808-0125", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wg2600hp2", "scope": "eq", "trust": 1.6, "vendor": "aterm", "version": "1.0.2" }, { "model": "wg2600hp2", "scope": "eq", "trust": 0.8, "vendor": "nec platforms", "version": "1.0.2" }, { "model": "aterm wg2600hp2", "scope": "eq", "trust": 0.6, "vendor": "nec", "version": "1.0.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15843" }, { "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "db": "CNNVD", "id": "CNNVD-201708-175" }, { "db": "NVD", "id": "CVE-2017-12575" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:necplatforms:nec_platforms_aterm_wg2600hp2_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014241" } ] }, "cve": "CVE-2017-12575", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-12575", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-15843", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-103111", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-12575", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-12575", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-12575", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-15843", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201708-175", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-103111", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15843" }, { "db": "VULHUB", "id": "VHN-103111" }, { "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "db": "CNNVD", "id": "CNNVD-201708-175" }, { "db": "NVD", "id": "CVE-2017-12575" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on the NEC Aterm WG2600HP2 1.0.2. The router has a set of web service APIs for access to and setup of the configuration. Some APIs don\u0027t require authentication. An attacker could exploit this vulnerability by sending a crafted HTTP request to retrieve DHCP clients, firmware version, and network status (ex.: curl -X http://[IP]/aterm_httpif.cgi/negotiate -d \"REQ_ID=SUPPORT_IF_GET\"). NEC Aterm WG2600HP2 Contains an access control vulnerability.Information may be obtained. The WG2600HP2 is a router product from NEC. A security vulnerability exists in NEC Aterm WG2600HP2 version 1.0.2", "sources": [ { "db": "NVD", "id": "CVE-2017-12575" }, { "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "db": "CNVD", "id": "CNVD-2018-15843" }, { "db": "VULHUB", "id": "VHN-103111" } ], "trust": 2.25 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-103111", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-103111" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12575", "trust": 3.1 }, { "db": "JVN", "id": "JVN38248512", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-014241", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201708-175", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-15843", "trust": 0.6 }, { "db": "JVNDB", "id": "JVNDB-2021-000006", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "149061", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-103111", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15843" }, { "db": "VULHUB", "id": "VHN-103111" }, { "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "db": "CNNVD", "id": "CNNVD-201708-175" }, { "db": "NVD", "id": "CVE-2017-12575" } ] }, "id": "VAR-201808-0125", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-15843" }, { "db": "VULHUB", "id": "VHN-103111" } ], "trust": 1.0499999999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15843" } ] }, "last_update_date": "2024-11-23T21:51:05.506000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Aterm WG2600HP2", "trust": 0.8, "url": "http://www.aterm.jp/product/atermstation/product/warpstar/wg2600hp2/index.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014241" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-103111" }, { "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "db": "NVD", "id": "CVE-2017-12575" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://seclists.org/fulldisclosure/2018/aug/26" }, { "trust": 1.7, "url": "http://jvn.jp/en/jp/jvn38248512/index.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12575" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12575" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-000006.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-15843" }, { "db": "VULHUB", "id": "VHN-103111" }, { "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "db": "CNNVD", "id": "CNNVD-201708-175" }, { "db": "NVD", "id": "CVE-2017-12575" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-15843" }, { "db": "VULHUB", "id": "VHN-103111" }, { "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "db": "CNNVD", "id": "CNNVD-201708-175" }, { "db": "NVD", "id": "CVE-2017-12575" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-22T00:00:00", "db": "CNVD", "id": "CNVD-2018-15843" }, { "date": "2018-08-24T00:00:00", "db": "VULHUB", "id": "VHN-103111" }, { "date": "2018-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "date": "2017-08-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-175" }, { "date": "2018-08-24T19:29:00.800000", "db": "NVD", "id": "CVE-2017-12575" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-22T00:00:00", "db": "CNVD", "id": "CNVD-2018-15843" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-103111" }, { "date": "2018-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014241" }, { "date": "2021-01-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-175" }, { "date": "2024-11-21T03:09:47.047000", "db": "NVD", "id": "CVE-2017-12575" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201708-175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NEC Aterm WG2600HP2 Access control vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014241" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201708-175" } ], "trust": 0.6 } }
var-202101-0875
Vulnerability from variot
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. Provided by NEC Corporation Aterm WF800HP , Aterm WG2600HP and Aterm WG2600HP2 There are multiple vulnerabilities in. Aterm WF800HP ・ Cross-site scripting (CWE-79) - CVE-2021-20620Aterm WG2600HP and Aterm WG2600HP2 ・ Inadequate access restrictions (CWE-284) - CVE-2017-12575 ・ Cross-site request forgery (CWE-352) - CVE-2021-20621 ・ Cross-site scripting (CWE-79) - CVE-2021-20622CVE-2021-20620 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Nagaoka Satoru Mr CVE-2021-20621, CVE-2021-20622 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Iwasaki Tokumei MrThe expected impact depends on each vulnerability, but it may be affected as follows. -Any script is executed on the web browser of the user who accessed the product. - CVE-2021-20620 ・ The setting information stored in the product may be stolen or changed by a remote third party. - CVE-2017-12575 -When a user logged in to the product accesses a specially crafted page, he / she is forced to perform an unintended operation. - CVE-2021-20621 -Any script is executed on the web browser of the user who is logged in to the product. - CVE-2021-20622
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0875", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wg2600hp2", "scope": "lte", "trust": 1.0, "vendor": "aterm", "version": "1.0.2" }, { "model": "wg2600hp", "scope": "lte", "trust": 1.0, "vendor": "aterm", "version": "1.0.2" }, { "model": "aterm wf800hp", "scope": "eq", "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": "firmware all versions" }, { "model": "aterm wg2600hp2", "scope": null, "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": null }, { "model": "aterm wg2600hp", "scope": null, "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "NVD", "id": "CVE-2021-20621" } ] }, "cve": "CVE-2021-20621", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 2.6, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000006", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 1.6, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-20621", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2021-000006", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000006", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-000006", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-20621", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-000006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000006", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-000006", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2021-20621", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-000006", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202101-2029", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-20621", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-20621" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "CNNVD", "id": "CNNVD-202101-2029" }, { "db": "NVD", "id": "CVE-2021-20621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. Provided by NEC Corporation Aterm WF800HP , Aterm WG2600HP and Aterm WG2600HP2 There are multiple vulnerabilities in. Aterm WF800HP \u30fb Cross-site scripting (CWE-79) - CVE-2021-20620Aterm WG2600HP and Aterm WG2600HP2 \u30fb Inadequate access restrictions (CWE-284) - CVE-2017-12575 \u30fb Cross-site request forgery (CWE-352) - CVE-2021-20621 \u30fb Cross-site scripting (CWE-79) - CVE-2021-20622CVE-2021-20620 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Nagaoka Satoru Mr CVE-2021-20621, CVE-2021-20622 This vulnerability information is provided by the following persons based on Information Security Early Warning Partnership: IPA Report to JPCERT/CC Coordinated with the developers. Reporter : Cyber Defense Institute, Inc. Iwasaki Tokumei MrThe expected impact depends on each vulnerability, but it may be affected as follows. -Any script is executed on the web browser of the user who accessed the product. - CVE-2021-20620 \u30fb The setting information stored in the product may be stolen or changed by a remote third party. - CVE-2017-12575 -When a user logged in to the product accesses a specially crafted page, he / she is forced to perform an unintended operation. - CVE-2021-20621 -Any script is executed on the web browser of the user who is logged in to the product. - CVE-2021-20622", "sources": [ { "db": "NVD", "id": "CVE-2021-20621" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "VULMON", "id": "CVE-2021-20621" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVN38248512", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2021-20621", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2021-000006", "trust": 1.4 }, { "db": "CNNVD", "id": "CNNVD-202101-2029", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-20621", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-20621" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "CNNVD", "id": "CNNVD-202101-2029" }, { "db": "NVD", "id": "CVE-2021-20621" } ] }, "id": "VAR-202101-0875", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.3625 }, "last_update_date": "2024-11-23T21:51:05.480000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Aterm\u00a0 series \u00a0 Multiple vulnerabilities in Support information", "trust": 0.8, "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "title": "Aterm Repair measures for cross-site request forgery vulnerabilities in multiple products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139979" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "CNNVD", "id": "CNNVD-202101-2029" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [IPA Evaluation ]", "trust": 0.8 }, { "problemtype": " Cross-site request forgery (CWE-352) [IPA Evaluation ]", "trust": 0.8 }, { "problemtype": " Authorization / authority / access control (CWE-264) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "NVD", "id": "CVE-2021-20621" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://jpn.nec.com/security-info/secinfo/nv21-005.html" }, { "trust": 1.7, "url": "https://jvn.jp/en/jp/jvn38248512/index.html" }, { "trust": 1.7, "url": "https://www.aterm.jp/support/tech/2019/0328.html" }, { "trust": 0.8, "url": "https://jvn.jp/jp/jvn38248512/index.html" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-000006.html" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20621" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/352.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/195442" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-20621" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "CNNVD", "id": "CNNVD-202101-2029" }, { "db": "NVD", "id": "CVE-2021-20621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2021-20621" }, { "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "db": "CNNVD", "id": "CNNVD-202101-2029" }, { "db": "NVD", "id": "CVE-2021-20621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-28T00:00:00", "db": "VULMON", "id": "CVE-2021-20621" }, { "date": "2021-01-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "date": "2021-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-2029" }, { "date": "2021-01-28T11:15:13.793000", "db": "NVD", "id": "CVE-2021-20621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-01T00:00:00", "db": "VULMON", "id": "CVE-2021-20621" }, { "date": "2021-02-03T03:04:00", "db": "JVNDB", "id": "JVNDB-2021-000006" }, { "date": "2021-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-2029" }, { "date": "2024-11-21T05:46:53.613000", "db": "NVD", "id": "CVE-2021-20621" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-2029" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aterm\u00a0WF800HP , Aterm\u00a0WG2600HP\u00a0 and \u00a0Aterm\u00a0WG2600HP2\u00a0 Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-000006" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-2029" } ], "trust": 0.6 } }