BDU:2023-02015
Scores
EPSS
Percentile: 0.0%
CVSS
CVSS Score: 8.8/10
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Privileges Required
Low (L)
Describes the level of privileges an attacker must possess
User Interaction
None (N)
Captures the requirement for a human user participation
Scope
Unchanged (U)
Determines if a successful attack impacts components beyond the vulnerable component
Confidentiality Impact
High (H)
Measures the impact to the confidentiality of information
Integrity Impact
High (H)
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
High (H)
Measures the impact to the availability of the impacted component
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Authentication
Single
Describes the level of privileges an attacker must possess
Confidentiality Impact
Complete
Measures the impact to the confidentiality of information
Integrity Impact
Complete
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
Complete
Measures the impact to the availability of the impacted component
Description
Уязвимость службы miniigd SOAP гигабитных Ethernet-чипов Realtek RTL81xx связана с недостаточной проверкой входных данных. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код с помощью специально сформированных запросов NewInternalClient
Scaner-VS 7 — a modern vulnerability management solution
Sources
Related Vulnerabilities
Exploits
Reference Links
Recommendations
Source: bdu
Установка обновлений из доверенных источников.
В связи со сложившейся обстановкой и введенными санкциями против Российской Федерации рекомендуется устанавливать обновления программного обеспечения только после оценки всех сопутствующих рисков.
Компенсирующие меры:
- ограничение взаимодействия со службой miniigd SOAP4;
- ограничение доступа к устройству из внешних сетей (Интернет);
- использование средств межсетевого экранирования с целью ограничения доступа к устройству.
Использование рекомендаций:
Для продуктов D-Link Corp:
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055
Для продуктов Aterm:
http://jvn.jp/en/jp/JVN67456944/index.html
Для продуктов ELECOM:
http://jvn.jp/en/jp/JVN47580234/index.html
Vulnerable Software (30)
Type: Configuration
Vendor: aterm
Product: w1200ex
Operating System: * *
{ "version_end_including": "1.3.1"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: w1200ex-ms
Operating System: * *
{ "version_end_including": "1.3.1"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: w300p
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: w500p
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wf300hp2
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wf800hp
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1200hp
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1200hp2
Operating System: * *
{ "version_end_including": "2.5.0"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1200hp3
Operating System: * *
{ "version_end_including": "1.3.1"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1200hs
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1200hs2
Operating System: * *
{ "version_end_including": "2.5.0"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1200hs3
Operating System: * *
{ "version_end_including": "1.1.2"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1800hp3
Operating System: * *
{ "version_end_including": "1.5.1"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1800hp4
Operating System: * *
{ "version_end_including": "1.3.1"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1900hp
Operating System: * *
{ "version_end_including": "2.5.1"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wg1900hp2
Operating System: * *
{ "version_end_including": "1.3.1"}
Source: bdu
Type: Configuration
Vendor: aterm
Product: wr8165n
Operating System: * *
{ "version_exact": "*"}
Source: bdu
Type: Configuration
Vendor: d-link corp.
Product: dir-600l a1
Operating System: * *
{ "version_end_including": "1.15", "version_start_including": "1.00"}
Source: bdu
Type: Configuration
Vendor: d-link corp.
Product: dir-600l a1
Operating System: * *
{ "version_end_including": "2.05", "version_start_including": "2.00"}
Source: bdu
Type: Configuration
Vendor: d-link corp.
Product: dir-605l a1
Operating System: * *
{ "version_end_including": "2.04", "version_start_including": "2.0"}
Source: bdu