Published:2021/11/30 Last Updated:2022/03/29
JVNVU#94527926
Multiple vulnerabilities in multiple ELECOM routers
Overview
Multiple ELECOM routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities.
Products Affected
- WRC-1167GST2 firmware v1.25 and earlier
- WRC-1167GST2A firmware v1.25 and earlier
- WRC-1167GST2H firmware v1.25 and earlier
- WRC-2533GS2-B firmware v1.52 and earlier
- WRC-2533GS2-W firmware v1.52 and earlier
- WRC-1750GS firmware v1.03 and earlier
- WRC-1750GSV firmware v2.11 and earlier
- WRC-1900GST firmware v1.03 and earlier
- WRC-2533GST firmware v1.03 and earlier
- WRC-2533GSTA firmware v1.03 and earlier
- WRC-2533GST2 firmware v1.25 and earlier
- WRC-2533GST2SP firmware v1.25 and earlier
- WRC-2533GST2-G firmware v1.25 and earlier
- EDWRC-2533GST2 firmware v1.25 and earlier
- WRC-1167GS2-B firmware v1.65 and earlier
- WRC-1167GS2H-B firmware v1.65 and earlier
- WMC-DLGST2-W firmware v1.24 and earlier
- WMC-M1267GST2-W firmware v1.24 and earlier
- WMC-2HC-W firmware v1.24 and earlier
- WMC-C2533GST-W firmware v1.24 and earlier
- WRC-1900GST2 firmware v1.15 and earlier
- WRC-1900GST2SP firmware v1.15 and earlier
- WRC-1750GST2 firmware v1.14 and earlier
Description
Multiple routers provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
- Improper access control leading to anti-CSRF tokens disclosure (CWE-284) - CVE-2021-20862
CVSS v3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Base Score: 5.4 - OS command injection (CWE-78) - CVE-2021-20863
CVSS v3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 8.8 - Improper access control leading to unauthorized activation of telnet service (CWE-284) - CVE-2021-20864
CVSS v3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 7.5
Impact
- A network-adjacent unauthenticated attacker may obtain anti-CSRF tokens and change the product's settings - CVE-2021-20862
- An attacker who can log in to the management screen may execute arbitrary OS commands with the root privilege - CVE-2021-20863
- A network-adjacent unauthenticated attacker may start the telnet service and exexute arbitrary OS commands with the root privilege - CVE-2021-20864
Solution
Apply the appropriate firmware update
Apply the appropriate firmware update according to the information provided by the developer.
The developer has released fixed versions listed below.
- WRC-1167GST2 firmware v1.27
- WRC-1167GST2A firmware v1.27
- WRC-1167GST2H firmware v1.27
- WRC-2533GS2-B firmware v1.61
- WRC-2533GS2-W firmware v1.61
- WRC-1750GS firmware v1.06
- WRC-1750GSV firmware v2.30
- WRC-1900GST firmware v1.06
- WRC-2533GST firmware v1.06
- WRC-2533GSTA firmware v1.06
- WRC-2533GST2 firmware v1.27
- WRC-2533GST2SP firmware v1.27
- WRC-2533GST2-G firmware v1.27
- EDWRC-2533GST2 firmware v1.27
- WRC-1167GS2-B firmware v1.66
- WRC-1167GS2H-B firmware v1.66
- WMC-DLGST2-W firmware v1.25
- WMC-M1267GST2-W firmware v1.25
- WMC-2HC-W firmware v1.25
- WMC-C2533GST-W firmware v1.25
- WRC-1900GST2 firmware v1.16
- WRC-1900GST2SP firmware v1.16
- WRC-1750GST2 firmware v1.15
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
ELECOM CO.,LTD. | Vulnerable | 2022/03/29 | ELECOM CO.,LTD. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Chuya Hayakawa and Katsuhiko Sato(a.k.a. goroh_kun) of 00One, Inc. reported these vulnerabilities to ELECOM CO.,LTD. and coordinated. ELECOM CO.,LTD. and JPCERT/CC published respective advisories in order to notify users of these vulnerabilities.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2021-20862 |
CVE-2021-20863 |
|
CVE-2021-20864 |
|
JVN iPedia |
|
Update History
- 2022/02/08
- ELECOM CO.,LTD. update status
- 2022/02/08
- Information under the section [Products Affected] and [Solution] was updated. The typos under the section [Credit] were fixed.
- 2022/03/29
- ELECOM CO.,LTD. update status
- 2022/03/29
- Information under the sections [Products Affected] and [Solution] was updated.