Published:2016/01/27 Last Updated:2016/02/12
JVN#54686544
HOME SPOT CUBE multiple vulnerabilities
Overview
HOME SPOT CUBE provided by KDDI CORPORATION contains multiple vulnerabilities.
Products Affected
- HOME SPOT CUBE
Description
HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. HOME SPOT CUBE contains multiple vulnerabilities listed below.
- Cross-site scripting - CVE-2016-1136
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N Base Score: 4.3 CVSS v2 AV:A/AC:L/Au:S/C:N/I:P/A:N Base Score: 2.7 - Open redirect - CVE-2016-1137
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Base Score: 4.7 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - HTTP header injection - CVE-2016-1138
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Base Score: 4.7 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - Cross-site request forgery - CVE-2016-1139
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score: 4.3 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - Click jacking - CVE-2016-1140
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score: 4.3 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - OS command injection - CVE-2016-1141
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Base Score: 4.3 CVSS v2 AV:A/AC:L/Au:S/C:P/I:P/A:P Base Score: 5.2
Impact
The affect of each vulnerability is as follows.
- An arbitrary script may be executed on user's web browser - CVE-2016-1136
- A user may be transferred to the external website specified by an attacker - CVE-2016-1137
- An HTTP response splitting attack may result in arbitrary cookie values - CVE-2016-1138
- An arbitrary administrative operation such as setting alteration may be executed - CVE-2016-1139, CVE-2016-1140
- An arbitrary OS command may be executed with the privileges of the application - CVE-2016-1141
Solution
Apply a Workaround
The following workaround can mitigate the affects of these vulnerabilities.
- Change the login password for the setting screen
- Do not access other websites while logged into the setting screen
- Close the web browser after setting operations are completed
- Delete the password stored in the web browser
The developer recommends that users should consider to use alternative products such as HOME SPOT CUBE2.
Vendor Status
Vendor | Link |
KDDI CORPORATION | Notes on use of HOME SPOT CUBE |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2016-1136 |
CVE-2016-1137 |
|
CVE-2016-1138 |
|
CVE-2016-1139 |
|
CVE-2016-1140 |
|
CVE-2016-1141 |
|
JVN iPedia |
JVNDB-2016-000007 |
JVNDB-2016-000008 |
|
JVNDB-2016-000009 |
|
JVNDB-2016-000010 |
|
JVNDB-2016-000011 |
|
JVNDB-2016-000012 |
Update History
- 2016/02/12
- Information under the section "Credit" was updated.