ID

VAR-202102-0485


CVE

CVE-2021-20644


TITLE

Multiple vulnerabilities in multiple ELECOM products

Trust: 0.8

sources: JVNDB: JVNDB-2021-000008

DESCRIPTION

ELECOM WRC-1467GHBK-A allows arbitrary scripts to be executed on the user's web browser by displaying a specially crafted SSID on the web setup page. The following multiple vulnerabilities exist in multiple products provided by ELECOM CORPORATION. ・ Inadequate access restrictions (CWE-284) - CVE-2021-20643 -Script injection on the management screen (CWE-74) - CVE-2021-20644 ・ Retractable cross-site scripting (CWE-79) - CVE-2021-20645 ・ Cross-site request forgery (CWE-352) - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 ・ OS Command injection (CWE-78) - CVE-2021-20648 -Insufficient verification of server certificate (CWE-295) - CVE-2021-20649 ・ UPnP Via OS Command injection (CWE-78) - CVE-2014-8361 CVE-2021-20643 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Institute of Information Security Yuasa Laboratory Nagakawa ( Ishibashi ) Australia Mr CVE-2021-20644 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Sato Rei Mr CVE-2021-20645, CVE-2021-20646 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Mitsui Bussan Secure Direction Co., Ltd. Tetsuyuki Ogawa Mr CVE-2021-20647, CVE-2021-20648, CVE-2021-20649 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr CVE-2021-20650 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Hiroshi Watanabe Mr CVE-2014-8361 The following person indicates that the product is vulnerable to IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr., National Institute of Information and Communications Technology Makita Daisuke Mr., National Institute of Information and Communications Technology Woods Yoshiki MrThe expected impact depends on each vulnerability, but it may be affected as follows. -The management password of the product is changed by processing the request crafted by a remote third party. - CVE-2021-20645 -When a user logged in to the management screen of the product accesses a specially crafted page, an arbitrary request is executed, and as a result, the settings of the product are changed unintentionally. telnet Daemon is started - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 ・ Any third party who can access the product OS Command is executed - CVE-2021-20648 ・ Man-in-the-middle attack (man-in-the-middle attack) The communication response has been tampered with, resulting in arbitrary in the product. OS Command is executed - CVE-2021-20649 ・ With the product UPnP Is valid, any by a third party who has access to the product OS Command is executed - CVE-2014-8361. ELECOM WRC-1467GHBK-A is a wireless access device. ELECOM WRC-1467GHBK-A has a cross-site scripting vulnerability. Attackers can use the vulnerability to inject malicious scripts or HTML code

Trust: 2.25

sources: NVD: CVE-2021-20644 // JVNDB: JVNDB-2021-000008 // CNVD: CNVD-2021-14146 // VULMON: CVE-2021-20644

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-14146

AFFECTED PRODUCTS

vendor:elecommodel:wrc-1467ghbk-ascope:eqversion: -

Trust: 1.0

vendor:elecommodel:ld-ps/u1scope:eqversion:(cve-2021-20643)

Trust: 0.8

vendor:elecommodel:ncc-ewf100rmwh2scope:eqversion:(cve-2021-20650)

Trust: 0.8

vendor:elecommodel:wrc-1467ghbk-ascope:eqversion:(cve-2021-20644)

Trust: 0.8

vendor:elecommodel:wrc-300febkscope:eqversion:(cve-2014-8361)

Trust: 0.8

vendor:elecommodel:wrc-300febk-ascope:eqversion:(cve-2021-20645, cve-2021-20646)

Trust: 0.8

vendor:elecommodel:wrc-300febk-sscope:eqversion:(cve-2021-20647, cve-2021-20648, cve-2021-20649, cve-2014-8361)

Trust: 0.8

vendor:elecommodel:wrc-f300nfscope:eqversion:(cve-2014-8361)

Trust: 0.8

vendor:elecommodel:wrc-1467ghbk-ascope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-14146 // JVNDB: JVNDB-2021-000008 // NVD: CVE-2021-20644

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2021-000008
value: MEDIUM

Trust: 4.8

nvd@nist.gov: CVE-2021-20644
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2021-000008
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-14146
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202101-2404
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-20644
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2021-000008
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2021-000008
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2021-000008
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:N
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2021-000008
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2021-000008
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2021-000008
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2021-000008
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-14146
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-20644
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-000008
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2021-000008
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2021-000008
baseSeverity: MEDIUM
baseScore: 5.2
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2021-000008
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2021-000008
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2021-000008
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2021-000008
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-14146 // JVNDB: JVNDB-2021-000008 // JVNDB: JVNDB-2021-000008 // JVNDB: JVNDB-2021-000008 // JVNDB: JVNDB-2021-000008 // JVNDB: JVNDB-2021-000008 // JVNDB: JVNDB-2021-000008 // JVNDB: JVNDB-2021-000008 // CNNVD: CNNVD-202101-2404 // NVD: CVE-2021-20644

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.0

problemtype:CWE-78

Trust: 0.8

problemtype:CWE-Other

Trust: 0.8

problemtype:CWE-79

Trust: 0.8

problemtype:CWE-352

Trust: 0.8

problemtype:CWE-264

Trust: 0.8

sources: JVNDB: JVNDB-2021-000008 // NVD: CVE-2021-20644

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202101-2404

TYPE

injection

Trust: 0.6

sources: CNNVD: CNNVD-202101-2404

CONFIGURATIONS

sources: JVNDB: JVNDB-2021-000008

PATCH

title:無線LANルーターなどネットワーク製品の一部における脆弱性に関してurl:https://www.elecom.co.jp/news/security/20210126-01/

Trust: 0.8

title:Patch for ELECOM WRC-1467GHBK-A cross-site scripting vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/250586

Trust: 0.6

sources: CNVD: CNVD-2021-14146 // JVNDB: JVNDB-2021-000008

EXTERNAL IDS

db:NVDid:CVE-2021-20644

Trust: 3.1

db:JVNid:JVN47580234

Trust: 2.4

db:JVNDBid:JVNDB-2021-000008

Trust: 1.4

db:CNVDid:CNVD-2021-14146

Trust: 0.6

db:CNNVDid:CNNVD-202101-2404

Trust: 0.6

db:VULMONid:CVE-2021-20644

Trust: 0.1

sources: CNVD: CNVD-2021-14146 // VULMON: CVE-2021-20644 // JVNDB: JVNDB-2021-000008 // CNNVD: CNNVD-202101-2404 // NVD: CVE-2021-20644

REFERENCES

url:https://www.elecom.co.jp/news/security/20210126-01/

Trust: 2.2

url:https://jvn.jp/en/jp/jvn47580234/index.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20649

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20650

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20643

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8361

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20644

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20645

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20646

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20647

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20648

Trust: 0.8

url:https://jvn.jp/jp/jvn47580234/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-20644

Trust: 0.6

url:https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-000008.html

Trust: 0.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/195675

Trust: 0.1

sources: CNVD: CNVD-2021-14146 // VULMON: CVE-2021-20644 // JVNDB: JVNDB-2021-000008 // CNNVD: CNNVD-202101-2404 // NVD: CVE-2021-20644

SOURCES

db:CNVDid:CNVD-2021-14146
db:VULMONid:CVE-2021-20644
db:JVNDBid:JVNDB-2021-000008
db:CNNVDid:CNNVD-202101-2404
db:NVDid:CVE-2021-20644

LAST UPDATE DATE

2024-11-23T21:34:43.302000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-14146date:2021-03-03T00:00:00
db:VULMONid:CVE-2021-20644date:2021-02-18T00:00:00
db:JVNDBid:JVNDB-2021-000008date:2021-01-26T03:12:23
db:CNNVDid:CNNVD-202101-2404date:2021-02-19T00:00:00
db:NVDid:CVE-2021-20644date:2024-11-21T05:46:56.077

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-14146date:2021-03-03T00:00:00
db:VULMONid:CVE-2021-20644date:2021-02-12T00:00:00
db:JVNDBid:JVNDB-2021-000008date:2021-01-26T03:12:23
db:CNNVDid:CNNVD-202101-2404date:2021-01-26T00:00:00
db:NVDid:CVE-2021-20644date:2021-02-12T07:15:15.060