Published:2021/02/15  Last Updated:2021/02/15

JVN#87164507
Calsos CSDJ fails to restrict access permissions

Overview

Calsos CSDJ provided by NEC Platforms, Ltd. fails to restrict access permissions.

Products Affected

  • CSDJ-B 01.08.00 and earlier
  • CSDJ-H 01.08.00 and earlier
  • CSDJ-D 01.08.00 and earlier
  • CSDJ-A 03.08.00 and earlier

Description

Calsos CSDJ provided by NEC Platforms, Ltd. fails to restrict access permissions (CWE-264), which may lead to an unauthorized user being able to view the historical data without access privileges.

Impact

A user who can login to the product may obtain unauthorized historical data without access privileges.

Solution

Apply the appropriate firmware update
Apply the appropriate firimware update according to the information provided by the developer.

Apply a Workaround
The following workaround may mitigate the impacts of this vulnerability.

  • Restrict the user permission to view all histrical data (i.e. "Login histry", "Operation history", "Control history", and "Report history")
For more information, please refer to the information provided by the developer (Japanese only).

Vendor Status

Vendor Status Last Update Vendor Notes
NEC Platforms, Ltd. Vulnerable 2021/02/15

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Base Score: 4.3
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:S/C:P/I:N/A:N
Base Score: 4.0
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2021-20653
JVN iPedia JVNDB-2021-000014