Published:2022/06/24  Last Updated:2022/06/24

JVN#51464799
L2Blocker Sensor setup screen vulnerable to authentication bypass

Overview

The setup screen of L2Blocker Sensor contains a login authentication bypass vulnerability.

Products Affected

  • L2Blocker(on-premise) Ver4.8.5 and earlier
  • L2Blocker(Cloud) Ver4.8.5 and earlier
According the developer, EOS versions 3 series and ealier are also affected by this vulnerability.

Description

L2Blocker provided by SOFTCREATE CORP. contains a vulnerability (CWE-288) in which the login authentication is bypassed by using alternative paths or channels for Sensor.

Impact

An attacker who can access the device may perform an unauthorized login and obtain the stored information or cause a malfunction of the device.

Solution

Update the Software
Update to the latest version according to the information provided by the developer.
The developer released the following version that fixes the vulnerability.

  • L2Blocker Ver4.8.6
According the developer, L2Blocker(Cloud) has already been updated by the developer, therefore no user update is required.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score: 5.4
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:A/AC:L/Au:N/C:P/I:P/A:N
Base Score: 4.8
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2022-33202
JVN iPedia JVNDB-2022-000048