JVN#73141967
PWR-Q200 vulnerable to DNS cache poisoning attacks
Overview
A mobile WiFi router PWR-Q200 provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION contains a vulnerability which may lead to DNS cache poisoninig attacks.
Products Affected
- PWR-Q200 all firmware versions
Description
PWR-Q200 provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION is a mobile WiFi router. PWR-Q200 is vulnerable to DNS cache poisoning attacks as DNS queries are done with a fixed source port (CWE-330).
Impact
The DNS responses spoofed by a remote attacker may result in any device on the LAN being led to a malicious server.
Solution
Do not use PWR-Q200
Stop using PWR-Q200 since PWR-Q200 is no longer supported.
The developer recommends to configure devices in the LAN to use the upstream ISP's DNS server.
For details, refer to the information provided by the developer.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION | Vulnerable | 2017/11/22 | NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Toshifumi Sakaguchi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2017-10874 |
JVN iPedia |
JVNDB-2017-000240 |