Published:2017/11/22  Last Updated:2017/11/22

JVN#73141967
PWR-Q200 vulnerable to DNS cache poisoning attacks

Overview

A mobile WiFi router PWR-Q200 provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION contains a vulnerability which may lead to DNS cache poisoninig attacks.

Products Affected

  • PWR-Q200 all firmware versions

Description

PWR-Q200 provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION is a mobile WiFi router.  PWR-Q200 is vulnerable to DNS cache poisoning attacks as DNS queries are done with a fixed source port (CWE-330).

Impact

The DNS responses spoofed by a remote attacker may result in any device on the LAN being led to a malicious server.

Solution

Do not use PWR-Q200
Stop using PWR-Q200 since PWR-Q200 is no longer supported.
The developer recommends to configure devices in the LAN to use the upstream ISP's DNS server.
For details, refer to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION Vulnerable 2017/11/22 NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Base Score: 6.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:M/Au:N/C:N/I:P/A:N
Base Score: 4.3
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Toshifumi Sakaguchi reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2017-10874
JVN iPedia JVNDB-2017-000240