Published:2016/12/02  Last Updated:2016/12/02
      
        JVN#40613060
        Multiple vulnerabilities in WNC01WH
              
      
      Overview
WNC01WH provided by BUFFALO INC. contains multiple vulnerabilities.
Products Affected
- WNC01WH firmware version 1.0.0.8 and earlier
 
Description
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains multiple vulnerabilities listed below.
- Denial-of-service (DoS) - CVE-2016-7821
	
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Base Score: 6.5 CVSS v2 AV:N/AC:H/Au:N/C:N/I:N/A:C Base Score: 5.4  - Cross-site request forgery (CWE-352) - CVE-2016-7822
	
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N Base Score: 7.1 CVSS v2 AV:N/AC:H/Au:N/C:P/I:P/A:N Base Score: 4.0  - Stored cross-site scripting (CWE-79) - CVE-2016-7823
	
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N Base Score: 4.3 CVSS v2 AV:A/AC:L/Au:S/C:N/I:P/A:N Base Score: 2.7  - Enabling debug option - CVE-2016-7824
	
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 6.8 CVSS v2 AV:A/AC:L/Au:S/C:N/I:P/A:N Base Score: 2.7  - Directory traversal due to an issue in processing commands (CWE-22) - CVE-2016-7825
	
CVSS v3 CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N Base Score: 2.0 CVSS v2 AV:A/AC:H/Au:S/C:P/I:N/A:N Base Score: 1.4  - Directory traversal due to an issue in processing POST request (CWE-22) - CVE-2016-7826
	
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H Base Score: 6.1 CVSS v2 AV:A/AC:L/Au:S/C:N/I:P/A:C Base Score: 6.2  
Impact
- If a user views a malicious page while logged-in, the user may not be able to access the management screen - CVE-2016-7821
 - If a user views a malicious page while logged-in, unintended operations may be conducted - CVE-2016-7822
 - An arbitrary script may be executed on the logged-in user's web browser - CVE-2016-7823
 - An authenticated attacker may enable the debug option - CVE-2016-7824
 - An authenticated attacker may obtain arbitrary files on the product - CVE-2016-7825
 - An authenticated attacker may delete arbitrary files on the product - CVE-2016-7826
 
Solution
Update the Firmware
Update to the latest version of firmware according to the information provided by the developer.
Vendor Status
| Vendor | Status | Last Update | Vendor Notes | 
|---|---|---|---|
| BUFFALO INC. | Vulnerable | 2016/12/02 | BUFFALO INC. website | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | 
                                     | 
              
| JPCERT Reports | 
                                     | 
              
| CERT Advisory | 
                                     | 
              
| CPNI Advisory | 
                                     | 
              
| TRnotes | 
                                     | 
              
| CVE | 
                                    CVE-2016-7821 | 
              
| 
                                    CVE-2016-7822 | 
              |
| 
                                    CVE-2016-7823 | 
              |
| 
                                    CVE-2016-7824 | 
              |
| 
                                    CVE-2016-7825 | 
              |
| 
                                    CVE-2016-7826 | 
              |
| JVN iPedia | 
                                    JVNDB-2016-000236 | 
              
| 
                                    JVNDB-2016-000237 | 
              |
| 
                                    JVNDB-2016-000238 | 
              |
| 
                                    JVNDB-2016-000239 | 
              |
| 
                                    JVNDB-2016-000240 | 
              |
| 
                                    JVNDB-2016-000241 |