Published:2015/12/25  Last Updated:2015/12/25

JVN#51250073
CG-WLNCM4G may behave as an open resolver

Overview

CG-WLNCM4G contains an issue where it may behave as an open resolver.

Products Affected

  • CG-WLNCM4G

Description

CG-WLNCM4G provided by Corega Inc is a network camera. CG-WLNCM4G contains an issue where it may behave as an open resolver.

Impact

The device may be leveraged for use in a DNS amplification attack and unknowingly become a part of a DDoS attack.

Solution

Do not use CG-WLNCM4G
As of December 25, 2015, there are no practical solutions to this issue.
It is recommended to stop using CG-WLNCM4G according to the information provided by the developer.

According to the developer, the following products are not affected by this issue.

  • CG-NCBU031A
  • CG-NCVD031A
  • CG-NCDO011A
  • CG-NCPFE011A
  • CG-NCPVD032A
Apply a Workaround
The following workaround may mitigate the affects of this issue.
  • Restrict access to the product from the internet, through router settings or other functions

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Base Score: 5.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:N/C:N/I:N/A:P
Base Score: 5.0
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

SASABE Tetsuro of The University of Tokyo reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2015-7794
JVN iPedia JVNDB-2015-000203