Published:2024/01/23 Last Updated:2024/08/27
JVNVU#90908488
ELECOM wireless LAN routers vulnerable to OS command injection
Overview
Multiple ELECOM wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability.
Products Affected
- WRC-X1800GS-B v1.17 and earlier
- WRC-X1800GSA-B v1.17 and earlier
- WRC-X1800GSH-B v1.17 and earlier
- WRC-X6000XS-G v1.09
- WRC-X6000XST-G v1.12 and earlier
- WRC-X1500GS-B v1.11 and earlier
- WRC-X1500GSA-B v1.11 and earlier
- WRC-X3000GS2-B v1.08 and earlier
- WRC-X3000GS2-W v1.08 and earlier
- WRC-X3000GS2A-B v1.08 and earlier
Description
Wireless LAN routers provided by ELECOM CO.,LTD. contain an OS command injection vulnerability (CWE-78).
Impact
If a logged-in user with an administrative privilege sends a specially crafted request to the product, an arbitrary OS command may be executed.
Solution
Update the firmware
Update the firmware to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
ELECOM CO.,LTD. | Vulnerable | 2024/08/20 | ELECOM CO.,LTD. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score:
6.8
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
CVSS v2
AV:A/AC:L/Au:S/C:P/I:P/A:P
Base Score:
5.2
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-22372 |
JVN iPedia |
|
Update History
- 2024/07/30
- ELECOM CO.,LTD. update status
- 2024/07/30
- Information under the section [Products Affected] was updated
- 2024/08/27
- ELECOM CO.,LTD. update status
- 2024/08/27
- Information under the section [Products Affected] was updated