ID

VAR-202205-1606


CVE

CVE-2022-29525


TITLE

Rakuten Mobile Rakuten Casa Trust Management Issue Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2022-77817 // CNNVD: CNNVD-202205-3823

DESCRIPTION

Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation. Provided by Rakuten Mobile, Inc. Rakuten Casa There are multiple vulnerabilities in the following: - Use of hardcoded credentials (CWE-798) - CVE-2022-29525 - Inadequate access restrictions (CWE-284) - CVE-2022-28704 - Inadequate access restrictions (CWE-284) - CVE-2022-26834CVE-2022-29525 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Rack Co., Ltd. Hirai Narumi Mr CVE-2022-28704 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Oshiro Yuki Mr. Tagawa Maki Mr CVE-2022-26834 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Tagawa Maki MrThe expected impact varies depending on the vulnerability, but the following impacts may occur: - A third party who has access to information about the affected product's case may root The user can log in with the appropriate permissions and perform any operation. - CVE-2022-29525 ・Initial settings WAN From the side SSH If your computer is set to accept connections and you are connected to the Internet without changing the authentication information from the default settings, root The user can log in with the appropriate permissions and perform any operation. - CVE-2022-28704 ・Initial settings WAN From the side HTTP The device is ready to accept connections, and internal information about the device can be obtained. - CVE-2022-26834. Rakuten Mobile Rakuten Casa is a small base station of Rakuten Mobile in Japan. Used to improve radio wave conditions for users. Rakuten Mobile Rakuten Casa AP_F_V2_0_0 and AP_F_V1_4_1 versions have a trust management issue vulnerability, which is caused by hard-coded credentials in the application code. An unauthenticated remote attacker could exploit this vulnerability to gain full access to a vulnerable system using hard-coded credentials

Trust: 2.25

sources: NVD: CVE-2022-29525 // JVNDB: JVNDB-2022-000036 // CNVD: CNVD-2022-77817 // VULMON: CVE-2022-29525

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-77817

AFFECTED PRODUCTS

vendor:rakutenmodel:casascope:eqversion:ap_f_v2_0_0

Trust: 1.0

vendor:rakutenmodel:casascope:eqversion:ap_f_v1_4_1

Trust: 1.0

vendor:楽天モバイル株式会社model:rakuten casascope:eqversion: -

Trust: 0.8

vendor:楽天モバイル株式会社model:rakuten casascope:eqversion:ap_f_v1_4_1 or ap_f_v2_0_0

Trust: 0.8

vendor:rakutenmodel:mobile rakuten casa ap f v2 0 0scope: - version: -

Trust: 0.6

vendor:rakutenmodel:mobile rakuten casa ap f v1 4 1scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2022-77817 // JVNDB: JVNDB-2022-000036 // NVD: CVE-2022-29525

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-29525
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2022-77817
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202205-3823
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-29525
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2022-000036
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2022-77817
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-29525
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

IPA: JVNDB-2022-000036
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-77817 // JVNDB: JVNDB-2022-000036 // CNNVD: CNNVD-202205-3823 // NVD: CVE-2022-29525

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.0

problemtype:others (CWE-Other) [IPA evaluation ]

Trust: 0.8

problemtype: Authorization / authority / access control (CWE-264) [IPA evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-000036 // NVD: CVE-2022-29525

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202205-3823

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202205-3823

PATCH

title:【important】 Rakuten Casa Software update informationurl:https://network.mobile.rakuten.co.jp/information/news/product/1033/

Trust: 0.8

title:Patch for Rakuten Mobile Rakuten Casa Trust Management Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/349126

Trust: 0.6

title:Rakuten Mobile Rakuten Casa Repair measures for trust management problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=197082

Trust: 0.6

sources: CNVD: CNVD-2022-77817 // JVNDB: JVNDB-2022-000036 // CNNVD: CNNVD-202205-3823

EXTERNAL IDS

db:NVDid:CVE-2022-29525

Trust: 3.9

db:JVNid:JVN46892984

Trust: 2.5

db:JVNDBid:JVNDB-2022-000036

Trust: 1.4

db:CS-HELPid:SB2022051910

Trust: 1.2

db:CNVDid:CNVD-2022-77817

Trust: 0.6

db:CNNVDid:CNNVD-202205-3823

Trust: 0.6

db:VULMONid:CVE-2022-29525

Trust: 0.1

sources: CNVD: CNVD-2022-77817 // VULMON: CVE-2022-29525 // JVNDB: JVNDB-2022-000036 // CNNVD: CNNVD-202205-3823 // NVD: CVE-2022-29525

REFERENCES

url:https://jvn.jp/en/jp/jvn46892984/index.html

Trust: 1.7

url:https://network.mobile.rakuten.co.jp/information/news/product/1033/

Trust: 1.7

url:https://www.cybersecurity-help.cz/vdb/sb2022051910

Trust: 1.2

url:https://jvn.jp/jp/jvn46892984/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-26834

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-28704

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-29525

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-29525/

Trust: 0.6

url:https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-000036.html

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-77817 // VULMON: CVE-2022-29525 // JVNDB: JVNDB-2022-000036 // CNNVD: CNNVD-202205-3823 // NVD: CVE-2022-29525

SOURCES

db:CNVDid:CNVD-2022-77817
db:VULMONid:CVE-2022-29525
db:JVNDBid:JVNDB-2022-000036
db:CNNVDid:CNNVD-202205-3823
db:NVDid:CVE-2022-29525

LAST UPDATE DATE

2024-08-14T14:49:49.375000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-77817date:2022-11-16T00:00:00
db:VULMONid:CVE-2022-29525date:2022-06-13T00:00:00
db:JVNDBid:JVNDB-2022-000036date:2024-06-18T03:07:00
db:CNNVDid:CNNVD-202205-3823date:2022-06-30T00:00:00
db:NVDid:CVE-2022-29525date:2022-06-22T14:44:46.890

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-77817date:2022-09-06T00:00:00
db:VULMONid:CVE-2022-29525date:2022-06-13T00:00:00
db:JVNDBid:JVNDB-2022-000036date:2022-05-19T00:00:00
db:CNNVDid:CNNVD-202205-3823date:2022-05-19T00:00:00
db:NVDid:CVE-2022-29525date:2022-06-13T05:15:11.313