Published:2013/05/15  Last Updated:2013/05/15

JVN#85371480
Wi-Fi Spot Configuration Software vulnerability in the connection process

Overview

Wi-Fi Spot Configuration Software provided by SoftBank contains a vulnerability within the process of connecting to Wi-Fi access points.

Products Affected

Some models that contain Wi-Fi support provided by SoftBank, WILLCOM and Disney Mobile on Softbank are vulnerable to this issue.
Note that fixed versions of the software have been released from SoftBank. For more information, refer to the information provided by the developer or distributor.

Description

Wi-Fi Spot Configuration Software provided by SoftBank contains a vulnerability within the process of connecting to Wi-Fi access points, which may lead to user information being sent unintentionally.

Impact

When connecting to a Wi-Fi access point, an attacker may obtain user information.

Solution

Update the software
A fixed version of the software has been provided by SoftBank.
Update to the latest version of the software according to the information provided by the developer or distributor.

Vendor Status

Vendor Status Last Update Vendor Notes
Disney Mobile on SoftBank Vulnerable 2013/05/15
SoftBank Vulnerable 2013/05/15
WILLCOM Vulnerable 2013/05/15

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2013.05.15

Measures Conditions Severity
Access Required must be attacked from a local segment, such as Ethernet, Bluetooth, and 802.11 attacks
  • Mid-High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures

Credit

Masashi Sakai reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2013-2310
JVN iPedia JVNDB-2013-000039