jvndb-2023-007150
Vulnerability from jvndb
Published
2023-11-17 17:31
Modified
2024-07-11 17:05
Severity ?
Summary
Multiple vulnerabilities in First Corporation's DVRs
Details
DVRs provided by First Co., Ltd. contain multiple vulnerabilities listed below.
* Use of hard-coded password (CWE-259) - CVE-2023-47213
* Missing authentication for critical function (CWE-306) - CVE-2023-47674
Yoshiki Mori of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
| Type | URL | |
|---|---|---|
|
|
||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-007150.html",
"dc:date": "2024-07-11T17:05+09:00",
"dcterms:issued": "2023-11-17T17:31+09:00",
"dcterms:modified": "2024-07-11T17:05+09:00",
"description": "DVRs provided by First Co., Ltd. contain multiple vulnerabilities listed below.\r\n\r\n * Use of hard-coded password (CWE-259) - CVE-2023-47213\r\n * Missing authentication for critical function (CWE-306) - CVE-2023-47674\r\n\r\nYoshiki Mori of National Institute of Information and Communications Technology Cybersecurity Research Institute reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.",
"link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-007150.html",
"sec:cpe": [
{
"#text": "cpe:/o:c-first:cfr-1004ea_firmware",
"@product": "CFR-1004EA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-1008ea_firmware",
"@product": "CFR-1008EA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-1016ea_firmware",
"@product": "CFR-1016EA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-16eaa_firmware",
"@product": "CFR-16EAA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-16eab_firmware",
"@product": "CFR-16EAB firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-16eha_firmware",
"@product": "CFR-16EHA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-16ehd_firmware",
"@product": "CFR-16EHD firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-4eaam_firmware",
"@product": "CFR-4EAAM firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-4eaa_firmware",
"@product": "CFR-4EAA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-4eabc_firmware",
"@product": "CFR-4EABC firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-4eab_firmware",
"@product": "CFR-4EAB firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-4eha_firmware",
"@product": "CFR-4EHA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-4ehd_firmware",
"@product": "CFR-4EHD firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-8eaa_firmware",
"@product": "CFR-8EAA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-8eab_firmware",
"@product": "CFR-8EAB firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-8eha_firmware",
"@product": "CFR-8EHA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-8ehd_firmware",
"@product": "CFR-8EHD firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-904e_firmware",
"@product": "CFR-904E firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-908e_firmware",
"@product": "CFR-908E firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:cfr-916e_firmware",
"@product": "CFR-916E firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-404aa_firmware",
"@product": "MD-404AA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-404ab_firmware",
"@product": "MD-404AB firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-404ha_firmware",
"@product": "MD-404HA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-404hd_firmware",
"@product": "MD-404HD firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-808aa_firmware",
"@product": "MD-808AA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-808ab_firmware",
"@product": "MD-808AB firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-808ha_firmware",
"@product": "MD-808HA firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:c-first:md-808hd_firmware",
"@product": "MD-808HD firmware",
"@vendor": "First Co., Ltd.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "9.8",
"@severity": "Critical",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2023-007150",
"sec:references": [
{
"#text": "https://jvn.jp/en/vu/JVNVU99077347/index.html",
"@id": "JVNVU#99077347",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2023-47213",
"@id": "CVE-2023-47213",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2023-47674",
"@id": "CVE-2023-47674",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-47213",
"@id": "CVE-2023-47213",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-47674",
"@id": "CVE-2023-47674",
"@source": "NVD"
},
{
"#text": "https://blog.nicter.jp/2022/04/nicter_statistics_2022_1q/#%E6%97%A5%E6%9C%AC%E5%9B%BD%E5%86%85%E3%81%AE-mirai-%E6%84%9F%E6%9F%93%E3%83%9B%E3%82%B9%E3%83%88%E6%95%B0%E3%81%AE%E6%80%A5%E5%A2%97%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6",
"@id": "NICTER Blog",
"@source": "Related document"
},
{
"#text": "https://cwe.mitre.org/data/definitions/259.html",
"@id": "CWE-259",
"@title": "Use of Hard-coded Password(CWE-259)"
},
{
"#text": "https://cwe.mitre.org/data/definitions/306.html",
"@id": "CWE-306",
"@title": "Missing Authentication for Critical Function(CWE-306)"
}
],
"title": "Multiple vulnerabilities in First Corporation\u0027s DVRs"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…