ID

VAR-201901-0837


CVE

CVE-2018-16193


TITLE

NEC Aterm WF1200CR and Aterm WG1200CR Cross-Site Scripting Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2018-25742 // CNNVD: CNNVD-201812-708

DESCRIPTION

Cross-site scripting vulnerability in Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. Aterm WF1200CR and Aterm WG1200CR provided by NEC Corporation contain multiple vulnerabilities listed below. * Information disclosure (CWE-200) - CVE-2018-16192 * Stored cross-site scripting (CWE-79) - CVE-2018-16193 * OS command injection (CWE-78) - CVE-2018-16194 * OS command injection in SOAP interface of UPnP (CWE-78) - CVE-2018-16195 Satoru Nagaoka of Cyber Defense Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.* An attacker with access to the device may obtain registered information on the device. - CVE-2018-16192 * An arbitrary script may be executed on a logged in user's web browser. - CVE-2018-16193 * An attacker who can log in the device may execute an arbitrary OS command. - CVE-2018-16194 * By having the device to load an invalid parameter using UPnP function, an attacker with access to the device may execute an arbitrary OS command. - CVE-2018-16195. NECAtermWF1200CR and AtermWG1200CR are both router products of NEC

Trust: 2.16

sources: NVD: CVE-2018-16193 // JVNDB: JVNDB-2018-000131 // CNVD: CNVD-2018-25742

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-25742

AFFECTED PRODUCTS

vendor:necmodel:aterm wf1200crscope:lteversion:1.1.1

Trust: 1.0

vendor:necmodel:aterm wg1200crscope:lteversion:1.0.1

Trust: 1.0

vendor:necmodel:aterm wf1200crscope:lteversion:firmware ver1.1.1

Trust: 0.8

vendor:necmodel:aterm wg1200crscope:lteversion:firmware ver1.0.1

Trust: 0.8

vendor:necmodel:aterm wf1200crscope:lteversion:<=1.1.1

Trust: 0.6

vendor:302 240necmodel:aterm wg1200crscope:lteversion:<=1.0.1

Trust: 0.6

vendor:necmodel:aterm wf1200crscope:eqversion:1.1.1

Trust: 0.6

vendor:necmodel:aterm wg1200crscope:eqversion:1.0.1

Trust: 0.6

sources: CNVD: CNVD-2018-25742 // JVNDB: JVNDB-2018-000131 // CNNVD: CNNVD-201812-708 // NVD: CVE-2018-16193

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2018-000131
value: MEDIUM

Trust: 2.4

nvd@nist.gov: CVE-2018-16193
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2018-000131
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-25742
value: LOW

Trust: 0.6

CNNVD: CNNVD-201812-708
value: LOW

Trust: 0.6

nvd@nist.gov: CVE-2018-16193
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2018-000131
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2018-000131
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2018-000131
severity: LOW
baseScore: 2.3
vectorString: AV:A/AC:M/AU:S/C:N/I:P/A:N
accessVector: ADJACENT NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2018-000131
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2018-25742
severity: LOW
baseScore: 2.3
vectorString: AV:A/AC:M/AU:S/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-16193
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.0

Trust: 1.0

IPA: JVNDB-2018-000131
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2018-000131
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2018-000131
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2018-000131
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-25742 // JVNDB: JVNDB-2018-000131 // JVNDB: JVNDB-2018-000131 // JVNDB: JVNDB-2018-000131 // JVNDB: JVNDB-2018-000131 // CNNVD: CNNVD-201812-708 // NVD: CVE-2018-16193

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

problemtype:CWE-78

Trust: 0.8

problemtype:CWE-200

Trust: 0.8

sources: JVNDB: JVNDB-2018-000131 // NVD: CVE-2018-16193

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201812-708

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201812-708

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-000131

PATCH

title:Information from NEC Corporationurl:https://jpn.nec.com/security-info/secinfo/nv18-021.html

Trust: 0.8

title:Patch for NECAtermWF1200CR and AtermWG1200CR Cross-Site Scripting Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/147503

Trust: 0.6

title:NEC Aterm WF1200CR and Aterm WG1200CR Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87931

Trust: 0.6

sources: CNVD: CNVD-2018-25742 // JVNDB: JVNDB-2018-000131 // CNNVD: CNNVD-201812-708

EXTERNAL IDS

db:NVDid:CVE-2018-16193

Trust: 3.0

db:JVNid:JVN87535892

Trust: 2.4

db:JVNDBid:JVNDB-2018-000131

Trust: 1.4

db:CNVDid:CNVD-2018-25742

Trust: 0.6

db:CNNVDid:CNNVD-201812-708

Trust: 0.6

sources: CNVD: CNVD-2018-25742 // JVNDB: JVNDB-2018-000131 // CNNVD: CNNVD-201812-708 // NVD: CVE-2018-16193

REFERENCES

url:https://jvn.jp/en/jp/jvn87535892/index.html

Trust: 2.4

url:https://jpn.nec.com/security-info/secinfo/nv18-021.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16192

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16193

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16194

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16195

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16192

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16193

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16194

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16195

Trust: 0.8

url:https://jvndb.jvn.jp/en/contents/2018/jvndb-2018-000131.html

Trust: 0.6

sources: CNVD: CNVD-2018-25742 // JVNDB: JVNDB-2018-000131 // CNNVD: CNNVD-201812-708 // NVD: CVE-2018-16193

SOURCES

db:CNVDid:CNVD-2018-25742
db:JVNDBid:JVNDB-2018-000131
db:CNNVDid:CNNVD-201812-708
db:NVDid:CVE-2018-16193

LAST UPDATE DATE

2024-11-23T21:52:31.704000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-25742date:2018-12-19T00:00:00
db:JVNDBid:JVNDB-2018-000131date:2019-08-27T00:00:00
db:CNNVDid:CNNVD-201812-708date:2018-12-17T00:00:00
db:NVDid:CVE-2018-16193date:2024-11-21T03:52:15.893

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-25742date:2018-12-19T00:00:00
db:JVNDBid:JVNDB-2018-000131date:2018-12-14T00:00:00
db:CNNVDid:CNNVD-201812-708date:2018-12-17T00:00:00
db:NVDid:CVE-2018-16193date:2019-01-09T23:29:04.403