JVNVU#97836276
Sharp NEC Display Solutions' public displays vulnerable to local file inclusion
Overview
Multiple public displays provided by Sharp NEC Display Solutions, Ltd. contain a local file inclusion vulnerability.
Products Affected
A wide range of the products and versions are affected.
As for the details of the affected products and versions, refer to the information provided by the developer.
Description
Multiple public displays provided by Sharp NEC Display Solutions, Ltd. contain a local file inclusion vulnerability (CWE-22, CVE-2023-7077).
Impact
If an attacker sends a specially crafted request to the product's web application, arbitrary code may be executed.
Solution
Stop using the products and Switch to alternative products
The developer states that the products are no longer supported, therefore recommends using alternative unaffected products.
Apply a Workaround
In the case that switching to alternative products is difficult, applying the following workaround may mitigate the impact of this vulnerability.
- Use the product only in a safe intranet protected by a firewall, etc. and do not connect the public displays to the Internet
Vendor Status
Vendor | Link |
Sharp NEC Display Solutions, Ltd. | Vulnerabilities in public displays |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
Tunahan TEKEOĞLU of Senior Cyber Security Consultant reported this vulnerability to Sharp NEC Display Solutions, Ltd. and coordinated. Sharp NEC Display Solutions, Ltd. reported this case to JPCERT/CC to notify users of the solution through JVN.