Published:2023/01/11 Last Updated:2023/01/11
JVN#99957889
Multiple vulnerabilities in MAHO-PBX NetDevancer series
Overview
MAHO-PBX NetDevancer series provided by Mahoroba Kobo, Inc. contain multiple vulnerabilities.
Products Affected
- MAHO-PBX NetDevancer Lite/Uni/Pro/Cloud prior to Ver.1.11.00
- MAHO-PBX NetDevancer VSG Lite/Uni prior to Ver.1.11.00
- MAHO-PBX NetDevancer MobileGate Home/Office prior to Ver.1.11.00
Description
There are multiple vulnerabilities in the Management screen of MAHO-PBX NetDevancer series provided by Mahoroba Kobo, Inc.
- OS Command Injection (CWE-78) - CVE-2023-22279
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 9.8 CVSS v2 AV:N/AC:L/Au:N/C:C/I:C/A:C Base Score: 10.0 - OS Command Injection (CWE-78) - CVE-2023-22280
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 7.2 CVSS v2 AV:N/AC:L/Au:S/C:C/I:C/A:C Base Score: 9.0 - Cross-Site Request Forgery (CWE-352) - CVE-2023-22286
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Base Score: 4.3 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6 - Reflected Cross-site Scripting (CWE-79) - CVE-2023-22296
CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Base Score: 6.1 CVSS v2 AV:N/AC:H/Au:N/C:N/I:P/A:N Base Score: 2.6
Impact
- An arbitrary OS command may be executed by a remote attacker - CVE-2023-22279
- An arbitrary OS command may be executed by an attacker who can log in to the product - CVE-2023-22280
- If a user views a malicious page while logged in, unintended operations may be performed - CVE-2023-22286
- An arbitrary script may be executed on the web browser of the user who is using the product - CVE-2023-22296
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Link |
Mahoroba Kobo, Inc. | Vulnerabilities of MAHO-PBX NetDevancer series (Text in Japanese) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Masamu Asato of GMO Cyber Security by IERAE reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2023-22279 |
CVE-2023-22280 |
|
CVE-2023-22286 |
|
CVE-2023-22296 |
|
JVN iPedia |
JVNDB-2023-000005 |