Published:2017/03/30 Last Updated:2017/04/20
JVN#55121369
CentreCOM AR260S V2 vulnerable to privilege escalation
Overview
CentreCOM AR260S V2 contains a privilege escalation vulnerability.
Products Affected
- CentreCOM AR260S V2
Description
​CentreCOM AR260S V2 provided by Allied Telesis K.K. is a wired LAN router. CentreCOM AR260S V2 contains a privilege escalation vulnerability.
Impact
Unintended operations may be performed with administrative privileges by a user who can log into the product with "guest" account.
Solution
Apply Workarounds
The following workarounds may mitigate the impacts of this vulnerability.
- Change the password of the account "guest"
The default password of the account "guest" is publicly known. Change the password of the account "guest" immediately to prevent an unauthenticated attacker from logging into the product. - Do not allow untrusted person to use the account "guest"
Once logged into the vulnerable product as "guest", this vulnerability can be exploited. Therefore do not allow untrusted person to use the "guest" account. - Enable the Firewall protection
The product has a firewall protection, and it is enabled by default. Enable firewall to protect the product from unintended accesses from WAN side.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Allied Telesis K.K. | Vulnerable | 2017/03/30 | Allied Telesis K.K. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score:
8.0
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
CVSS v2
AV:A/AC:L/Au:S/C:P/I:P/A:P
Base Score:
5.2
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Ziv Chang of Trend Micro Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2017-2125 |
JVN iPedia |
JVNDB-2017-000044 |
Update History
- 2017/04/20
- Information under the section "Impact" was modified.