ID

VAR-202308-2600


CVE

CVE-2023-35991


TITLE

Multiple vulnerabilities in ELECOM and Logitech network equipment

Trust: 0.8

sources: JVNDB: JVNDB-2023-002797

DESCRIPTION

Hidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions. Network equipment provided by ELECOM Co., Ltd. and Logitech Co., Ltd. contains the following multiple vulnerabilities. * Unpublished features (CWE-912) - CVE-2023-32626 , CVE-2023-35991 , CVE-2023-39445 It was * Telnet Inadequate access restrictions to services (CWE-284) - CVE-2023-38132 It was * Unpublished features (CWE-912) - CVE-2023-38576 It was * buffer overflow (CWE-120) - CVE-2023-39454 It was * OS Command injection (CWE-78) - CVE-2023-39455 , CVE-2023-40072 It was * OS Command injection (CWE-78) - CVE-2023-39944 , CVE-2023-40069 This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. It was * A third party with access to the product logs into a specific operation screen and performs arbitrary operations. OS Command is executed - CVE-2023-32626 , CVE-2023-35991 It was * by a third party who has access to the product; telnet logged into the service - CVE-2023-38132 It was * A third party who can log in to the product may perform arbitrary actions from a specific operation screen. OS Command is executed - CVE-2023-38576 It was * A third party with access to the product sends a specially crafted file to a specific operation screen and executes arbitrary code. - CVE-2023-39445 It was * Arbitrary code can be executed by a third party who has access to the product - CVE-2023-39454 It was * A third party who can log in to the product sends a specially crafted request and sends an arbitrary request. OS Command is executed - CVE-2023-39455 , CVE-2023-40072 It was * A third party with access to the product may send a specially crafted request to OS Command is executed - CVE-2023-39944 , CVE-2023-40069

Trust: 1.71

sources: NVD: CVE-2023-35991 // JVNDB: JVNDB-2023-002797 // VULMON: CVE-2023-35991

AFFECTED PRODUCTS

vendor:elecommodel:lan-wh300n\/drscope:eqversion:*

Trust: 1.0

vendor:elecommodel:lan-w300n\/drscope:eqversion:*

Trust: 1.0

vendor:elecommodel:lan-wh450n\/gpscope:eqversion:*

Trust: 1.0

vendor:elecommodel:lan-wh300an\/dgpscope:eqversion:*

Trust: 1.0

vendor:elecommodel:lan-wh300n\/dgpscope:eqversion:*

Trust: 1.0

vendor:elecommodel:lan-w300n\/pscope:eqversion:*

Trust: 1.0

vendor:elecommodel:lan-wh300andgpescope:eqversion:*

Trust: 1.0

vendor:エレコム株式会社model:wab-i1750-psscope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-w451ngrscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-1750ghbkscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-1750ghbk-escope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wab-s1167-psscope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-wh300n/rescope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wab-m1775-psscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wab-m2133scope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-wh300andgpescope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-w300n/rsscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-1900ghbk-sscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-1900ghbk-ascope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wab-s1775scope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-w300n/drscope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-wh450n/gpscope:eqversion:all s (cve-2023-35991)

Trust: 0.8

vendor:エレコム株式会社model:wrc-1467ghbk-sscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-1467ghbk-ascope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-w300n/pscope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-wh300n/drscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-f1167acfscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-1750ghbk2-iscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-x1800gsa-bscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-f1167acf2scope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-x1800gsh-bscope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-w300n/pr5scope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-600ghbk-ascope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-733febk2-ascope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-wh300n/dgpscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wab-s1167scope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-1167ghbk2scope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wrc-x1800gs-bscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wab-s600-psscope: - version: -

Trust: 0.8

vendor:ロジテック株式会社model:lan-wh300an/dgpscope: - version: -

Trust: 0.8

vendor:エレコム株式会社model:wab-s300scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-002797 // NVD: CVE-2023-35991

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-35991
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-35991
value: HIGH

Trust: 1.0

NVD: CVE-2023-35991
value: HIGH

Trust: 0.8

NVD: CVE-2023-35991
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2023-35991
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-35991
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2023-002797
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-002797 // NVD: CVE-2023-35991 // NVD: CVE-2023-35991

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

problemtype: Inappropriate access control (CWE-284) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

problemtype: Unpublished features (CWE-912) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-002797 // NVD: CVE-2023-35991

PATCH

title:wireless LAN Request for firmware update to improve router/repeater security ELECOM CO., LTD.url:https://www.elecom.co.jp/news/security/

Trust: 0.8

sources: JVNDB: JVNDB-2023-002797

EXTERNAL IDS

db:NVDid:CVE-2023-35991

Trust: 2.7

db:JVNid:JVNVU91630351

Trust: 1.9

db:JVNDBid:JVNDB-2023-002797

Trust: 0.8

db:VULMONid:CVE-2023-35991

Trust: 0.1

sources: VULMON: CVE-2023-35991 // JVNDB: JVNDB-2023-002797 // NVD: CVE-2023-35991

REFERENCES

url:https://jvn.jp/en/vu/jvnvu91630351/

Trust: 1.1

url:https://www.elecom.co.jp/news/security/20230810-01/

Trust: 1.1

url:http://jvn.jp/vu/jvnvu91630351/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-32626

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-35991

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-38132

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-38576

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-39445

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-39454

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-39455

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-39944

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-40069

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-40072

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-35991 // JVNDB: JVNDB-2023-002797 // NVD: CVE-2023-35991

SOURCES

db:VULMONid:CVE-2023-35991
db:JVNDBid:JVNDB-2023-002797
db:NVDid:CVE-2023-35991

LAST UPDATE DATE

2024-10-23T22:41:46.133000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-35991date:2023-08-18T00:00:00
db:JVNDBid:JVNDB-2023-002797date:2024-08-28T08:03:00
db:NVDid:CVE-2023-35991date:2024-10-21T21:35:01.433

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-35991date:2023-08-18T00:00:00
db:JVNDBid:JVNDB-2023-002797date:2023-08-15T00:00:00
db:NVDid:CVE-2023-35991date:2023-08-18T10:15:10.267