ID

VAR-201504-0521


CVE

CVE-2015-0932


TITLE

Multiple ANTlabs InnGate models allow unauthenticated read/write to filesystem

Trust: 0.8

sources: CERT/CC: VU#930956

DESCRIPTION

The ANTlabs InnGate firmware on IG 3100, IG 3101, InnGate 3.00 E, InnGate 3.01 E, InnGate 3.02 E, InnGate 3.10 E, InnGate 3.01 G, and InnGate 3.10 G devices does not require authentication for rsync sessions, which allows remote attackers to read or write to arbitrary files via TCP traffic on port 873. ANTlabs Made InnGate Is Visitor Based Network ( Network for hotel guests, etc. ) It is a gateway device for operating. InnGate Multiple models and multiple versions of firmware could allow a remote attacker to improperly configure rsync There is a vulnerability that allows reading and writing to the device file system without authentication through the daemon. Inappropriate default permissions (CWE-276) - CVE-2015-0932 InnGate Included in the firmware rsync Is not configured properly, it is possible to read and write to the entire device file system without authentication. Therefore, a remote attacker may be able to view or tamper with any file on the file system of the device. For more information, Cylance, Inc. of blog post It is written in. Inappropriate default permissions (CWE-276) https://cwe.mitre.org/data/definitions/276.html blog post http://blog.cylance.com/spear-team-cve-2015-0932A remote attacker may be able to view or alter any file on the file system of the device. ANTlabs InnGate firmware has any file read and write vulnerabilities. Multiple ANTlabs products are prone to an arbitrary file-access vulnerability

Trust: 3.15

sources: NVD: CVE-2015-0932 // CERT/CC: VU#930956 // JVNDB: JVNDB-2015-001968 // CNVD: CNVD-2015-02234 // BID: 73356

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02234

AFFECTED PRODUCTS

vendor:antlabsmodel:inngate ig 3.01 escope:eqversion:*

Trust: 1.0

vendor:antlabsmodel:inngate ig 3.10 escope:eqversion:*

Trust: 1.0

vendor:antlabsmodel:inngate ig 3100scope:eqversion:*

Trust: 1.0

vendor:antlabsmodel:inngate ig 3.10 gscope:eqversion:*

Trust: 1.0

vendor:antlabsmodel:inngate ig 3.00 escope:eqversion:*

Trust: 1.0

vendor:antlabsmodel:inngate ig 3.02 escope:eqversion:*

Trust: 1.0

vendor:antlabsmodel:inngate ig 3101scope:eqversion:*

Trust: 1.0

vendor:antlabsmodel: - scope: - version: -

Trust: 0.8

vendor:antlabsmodel:ig 3100scope:eqversion:model 3100

Trust: 0.8

vendor:antlabsmodel:ig 3100scope:eqversion:model 3101

Trust: 0.8

vendor:antlabsmodel:inngatescope:eqversion:3.00 e-series

Trust: 0.8

vendor:antlabsmodel:inngatescope:eqversion:3.01 e-series

Trust: 0.8

vendor:antlabsmodel:inngatescope:eqversion:3.01 g-series

Trust: 0.8

vendor:antlabsmodel:inngatescope:eqversion:3.02 e-series

Trust: 0.8

vendor:antlabsmodel:inngatescope:eqversion:3.10 e-series

Trust: 0.8

vendor:antlabsmodel:inngatescope:eqversion:3.10 g-series

Trust: 0.8

vendor:antlabsmodel:inngate igscope:eqversion:3100

Trust: 0.6

vendor:antlabsmodel:inngate igscope:eqversion:3101

Trust: 0.6

vendor:antlabsmodel:inngate inngate escope:eqversion:3.00

Trust: 0.6

vendor:antlabsmodel:inngate inngate escope:eqversion:3.01

Trust: 0.6

vendor:antlabsmodel:inngate inngate escope:eqversion:3.02

Trust: 0.6

vendor:antlabsmodel:inngate inngate escope:eqversion:3.10

Trust: 0.6

vendor:antlabsmodel:inngate inngate gscope:eqversion:3.01

Trust: 0.6

vendor:antlabsmodel:inngate and inngate gscope:eqversion:3.10

Trust: 0.6

vendor:antlabsmodel:inngate ig 3.10 escope: - version: -

Trust: 0.6

vendor:antlabsmodel:inngate ig 3.00 escope: - version: -

Trust: 0.6

vendor:antlabsmodel:inngate ig 3.02 escope: - version: -

Trust: 0.6

vendor:antlabsmodel:inngate ig 3101scope: - version: -

Trust: 0.6

vendor:antlabsmodel:inngate ig 3.10 gscope: - version: -

Trust: 0.6

vendor:antlabsmodel:inngate ig 3100scope: - version: -

Trust: 0.6

vendor:antlabsmodel:inngate ig 3.01 escope: - version: -

Trust: 0.6

vendor:antlabsmodel:inngate g-seriesscope:eqversion:3.100

Trust: 0.3

vendor:antlabsmodel:inngate e-seriesscope:eqversion:3.100

Trust: 0.3

vendor:antlabsmodel:inngate e-seriesscope:eqversion:3.020

Trust: 0.3

vendor:antlabsmodel:inngate g-seriesscope:eqversion:3.010

Trust: 0.3

vendor:antlabsmodel:inngate e-seriesscope:eqversion:3.010

Trust: 0.3

vendor:antlabsmodel:inngate e-seriesscope:eqversion:3.000

Trust: 0.3

vendor:antlabsmodel:igscope:eqversion:31010

Trust: 0.3

vendor:antlabsmodel:igscope:eqversion:31000

Trust: 0.3

sources: CERT/CC: VU#930956 // CNVD: CNVD-2015-02234 // BID: 73356 // JVNDB: JVNDB-2015-001968 // CNNVD: CNNVD-201504-070 // NVD: CVE-2015-0932

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2015-0932
value: HIGH

Trust: 1.6

nvd@nist.gov: CVE-2015-0932
value: HIGH

Trust: 1.0

CNVD: CNVD-2015-02234
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201504-070
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2015-0932
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2015-0932
severity: HIGH
baseScore: 10.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2015-02234
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CERT/CC: VU#930956 // CNVD: CNVD-2015-02234 // JVNDB: JVNDB-2015-001968 // CNNVD: CNNVD-201504-070 // NVD: CVE-2015-0932

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-001968 // NVD: CVE-2015-0932

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201504-070

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201504-070

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001968

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#930956

PATCH

title:ANTlabs Security Advisoryurl:http://www.antlabs.com/index.php?option=com_content&view=article&id=195:rsync-remote-file-system-access-vulnerability-cve-2015-0932&catid=54:advisories&Itemid=133

Trust: 0.8

title:\302\240ANTlabs InnGate firmware patch for arbitrary file read and write vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/57092

Trust: 0.6

sources: CNVD: CNVD-2015-02234 // JVNDB: JVNDB-2015-001968

EXTERNAL IDS

db:NVDid:CVE-2015-0932

Trust: 4.1

db:CERT/CCid:VU#930956

Trust: 4.1

db:JVNid:JVNVU91373232

Trust: 0.8

db:JVNDBid:JVNDB-2015-001968

Trust: 0.8

db:CNVDid:CNVD-2015-02234

Trust: 0.6

db:CNNVDid:CNNVD-201504-070

Trust: 0.6

db:BIDid:73356

Trust: 0.3

sources: CERT/CC: VU#930956 // CNVD: CNVD-2015-02234 // BID: 73356 // JVNDB: JVNDB-2015-001968 // CNNVD: CNNVD-201504-070 // NVD: CVE-2015-0932

REFERENCES

url:http://www.antlabs.com/index.php?option=com_content&view=article&id=195:rsync-remote-file-system-access-vulnerability-cve-2015-0932&catid=54:advisories&itemid=133

Trust: 3.5

url:http://blog.cylance.com/spear-team-cve-2015-0932

Trust: 3.5

url:http://www.wired.com/2015/03/big-vulnerability-hotel-wi-fi-router-puts-guests-risk/

Trust: 3.5

url:http://www.kb.cert.org/vuls/id/930956

Trust: 3.3

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0932

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0932

Trust: 0.8

url:http://jvn.jp/vu/jvnvu91373232/index.html

Trust: 0.8

url:http://www.antlabs.com/

Trust: 0.3

sources: CERT/CC: VU#930956 // CNVD: CNVD-2015-02234 // BID: 73356 // JVNDB: JVNDB-2015-001968 // CNNVD: CNNVD-201504-070 // NVD: CVE-2015-0932

CREDITS

Justin W. Clarke of Cylance Inc.

Trust: 0.3

sources: BID: 73356

SOURCES

db:CERT/CCid:VU#930956
db:CNVDid:CNVD-2015-02234
db:BIDid:73356
db:JVNDBid:JVNDB-2015-001968
db:CNNVDid:CNNVD-201504-070
db:NVDid:CVE-2015-0932

LAST UPDATE DATE

2025-04-13T23:39:06.915000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#930956date:2015-03-26T00:00:00
db:CNVDid:CNVD-2015-02234date:2015-04-09T00:00:00
db:BIDid:73356date:2015-03-26T00:00:00
db:JVNDBid:JVNDB-2015-001968date:2015-04-08T00:00:00
db:CNNVDid:CNNVD-201504-070date:2015-04-07T00:00:00
db:NVDid:CVE-2015-0932date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#930956date:2015-03-26T00:00:00
db:CNVDid:CNVD-2015-02234date:2015-04-09T00:00:00
db:BIDid:73356date:2015-03-26T00:00:00
db:JVNDBid:JVNDB-2015-001968date:2015-03-31T00:00:00
db:CNNVDid:CNNVD-201504-070date:2015-04-07T00:00:00
db:NVDid:CVE-2015-0932date:2015-04-05T01:59:01.163