Lucene search

K
jvnJapan Vulnerability NotesJVN:67456944
HistoryApr 09, 2021 - 12:00 a.m.

JVN#67456944: Multiple vulnerabilities in multiple Aterm products

2021-04-0900:00:00
Japan Vulnerability Notes
jvn.jp
78

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.969 High

EPSS

Percentile

99.7%

Multiple Aterm products provided by NEC Corporation contain multiple vulnerabilities listed below.

Cross-site Scripting (CWE-79) - CVE-2021-20680

Version Vector Score
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1
CVSS v2 AV:N/AC:M/Au:N/C:N/I:P/A:N Base Score: 4.3

OS command injection via UPnP (CWE-78) - CVE-2014-8361

Version Vector Score
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 8.8
CVSS v2 AV:A/AC:L/Au:N/C:P/I:P/A:P Base Score: 5.8

Impact

  • An arbitrary script may be executed on the user’s web browser - CVE-2021-20680
  • When UPnP is enabled, an attacker who can access the product may execute arbitrary OS commands - CVE-2014-8361

Solution

Update the firmware For the users of WG1900HP2, WG1900HP, WG1800HP4, WG1200HS3, WG1200HS2, WG1200HP3, WG1200HP2, W1200EX, and W1200EX-MS:
Update the firmware to the latest version according to the information provided by the developer.
According to the developer, the fixed firmware for WG1800HP3 will be released later. Until then, apply the following workarounds.

Apply workarounds For the users of WG1200HS, WG1200HP, WF800HP, WF300HP2, WR8165N, W500P, and W300P:
According to the developer, the update firmware for these pruducts is not planned to be released.
Applying the following workarounds may mitigate the impacts of the vulnerabilities.

  • Change the passwords of the web-based management utility and the Wi-Fi encryption key to stronger ones
  • CVE-2021-20680
    • When accessing a website, use a URL obtained from a trusted source and bookmark it. For subsequent accesses, use the bookmarked URL.
    • Close the web browser after the operation is finished on the web-based management utility.
    • Delete the credential of the web-based management utility stored in the web browser.
  • CVE-2014-8361
    • Disable UPnP.

Products Affected

  • Aterm WG1900HP2 firmware Ver.1.3.1 and earlier
  • Aterm WG1900HP firmware Ver.2.5.1 and earlier
  • Aterm WG1800HP4 firmware Ver.1.3.1 and earlier
  • Aterm WG1800HP3 firmware Ver.1.5.1 and earlier
  • Aterm WG1200HS3 firmware Ver.1.1.2 and earlier - Only affected by CVE-2021-20680 issue
  • Aterm WG1200HS2 firmware Ver.2.5.0 and earlier
  • Aterm WG1200HP3 firmware Ver.1.3.1 and earlier
  • Aterm WG1200HP2 firmware Ver.2.5.0 and earlier
  • Aterm W1200EX firmware Ver.1.3.1 and earlier
  • Aterm W1200EX-MS firmware Ver.1.3.1 and earlier
  • Aterm WG1200HS firmware all versions
  • Aterm WG1200HP firmware all versions
  • Aterm WF800HP firmware all versions
  • Aterm WF300HP2 firmware all versions
  • Aterm WR8165N firmware all versions
  • Aterm W500P firmware all versions
  • Aterm W300P firmware all versions

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.969 High

EPSS

Percentile

99.7%