Published:2023/11/14  Last Updated:2023/11/14

JVNVU#94119876
Multiple vulnerabilities in ELECOM and LOGITEC routers

Overview

Multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities.

Products Affected

CVE-2023-43752

  • WRC-X3000GS2-W v1.05 and earlier
  • WRC-X3000GS2-B v1.05 and earlier
  • WRC-X3000GS2A-B v1.05 and earlier
CVE-2023-43757
  • WRC-2533GHBK2-T all versions
  • WRC-2533GHBK-I all versions
  • WRC-1750GHBK2-I all versions
  • WRC-1750GHBK-E all versions
  • WRC-1750GHBK all versions
  • WRC-1167GHBK2 all versions
  • WRC-1167GHBK all versions
  • WRC-F1167ACF all versions
  • WRC-733GHBK all versions
  • WRC-733GHBK-I all versions
  • WRC-733GHBK-C all versions
  • WRC-300GHBK2-I all versions
  • WRC-300GHBK all versions
  • WRC-733FEBK all versions
  • WRC-300FEBK all versions
  • WRC-F300NF all versions
  • WRH-300WH-H all versions
  • WRH-300BK all versions
  • WRH-300WH all versions
  • WRH-300RD all versions
  • WRH-300SV all versions
  • WRH-300BK-S all versions
  • WRH-300WH-S all versions
  • WRH-300BK2-S all versions
  • WRH-300WH2-S all versions
  • WRH-H300BK all versions
  • WRH-H300WH all versions
  • WRH-150BK all versions
  • WRH-150WH all versions
  • LAN-W300N/RS all versions
  • LAN-W301NR all versions
  • LAN-W300N/P all versions
  • LAN-WH300N/DGP all versions
  • LAN-WH300NDGPE all versions

Description

Multiple routers provided by ELECOM CO.,LTD. and LOGITEC CORPORATION contain multiple vulnerabilities listed below.

  • OS Command Injection (CWE-78) - CVE-2023-43752
    CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 6.8
    CVSS v2 AV:A/AC:L/Au:S/C:P/I:P/A:P Base Score: 5.2
  • Inadequate Encryption Strength (CWE-326) - CVE-2023-43757
    CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score: 6.5
    CVSS v2 AV:A/AC:L/Au:N/C:P/I:N/A:N Base Score: 3.3

Impact

  • A logged-in user may execute an arbitrary OS command by sending a specially crafted request - CVE-2023-43752
  • An attacker who can access the product may guess the encryption key used for the wireless LAN communication and intercept the communication - CVE-2023-43757

Solution

CVE-2023-43752
Update the firmware
Update the firmware to the latest version according to the information provided by the developer.

CVE-2023-43757
Apply the workaround
The developer recommends to change the initial Wi-Fi (wireless LAN) encryption key to stronger ones instead of the default value.

Stop using the products
Some vulnerable products are no longer supported. Stop using the products and consider switching to alternative products. For more information, refer to the security advisories released on July 6, 2021 and August 10, 2023 from the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
ELECOM CO.,LTD. Vulnerable 2023/11/14 ELECOM CO.,LTD. website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

CVE-2023-43752
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.

CVE-2023-43757
Katsuhiko Sato(a.k.a. goroh_kun), Yuya Adachi and Ryo Kamino of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2023-43752
CVE-2023-43757
JVN iPedia

Update History

2023/11/14
Information under the section [Products Affected] was updated