JVN#85371480
Wi-Fi Spot Configuration Software vulnerability in the connection process
Overview
Wi-Fi Spot Configuration Software provided by SoftBank contains a vulnerability within the process of connecting to Wi-Fi access points.
Products Affected
Some models that contain Wi-Fi support provided by SoftBank, WILLCOM and Disney Mobile on Softbank are vulnerable to this issue.
Note that fixed versions of the software have been released from SoftBank. For more information, refer to the information provided by the developer or distributor.
Description
Wi-Fi Spot Configuration Software provided by SoftBank contains a vulnerability within the process of connecting to Wi-Fi access points, which may lead to user information being sent unintentionally.
Impact
When connecting to a Wi-Fi access point, an attacker may obtain user information.
Solution
Update the software
A fixed version of the software has been provided by SoftBank.
Update to the latest version of the software according to the information provided by the developer or distributor.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Disney Mobile on SoftBank | Vulnerable | 2013/05/15 | |
SoftBank | Vulnerable | 2013/05/15 | |
WILLCOM | Vulnerable | 2013/05/15 |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2013.05.15
Measures | Conditions | Severity |
---|---|---|
Access Required | must be attacked from a local segment, such as Ethernet, Bluetooth, and 802.11 attacks |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Masashi Sakai reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2013-2310 |
JVN iPedia |
JVNDB-2013-000039 |