Published:2025/06/18  Last Updated:2025/06/18

JVN#46288336
KCM3100 vulnerable to authentication bypass using an alternate path or channel

Overview

KCM3100 provided by KAON contains an authentication bypass using an alternate path or channel vulnerability.

Products Affected

  • KAON KCM3100 Ver1.4.2 and earlier

Description

KCM3100 provided by KAON is a Wi-Fi enabled gateway. KCM3100 contains the following vulnerability.

  • Authentication bypass using an alternate path or channel (CWE-288)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
    • CVE-2025-51381

Impact

An attacker may bypass the authentication of the product from within the LAN to which the product is connected.

Solution

Update the firmware
Update the firmware to the latest version according to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Namihiko Matsumura reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-51381
JVN iPedia JVNDB-2025-000040