ID

VAR-201512-0330


CVE

CVE-2015-8262


TITLE

Buffalo AirStation Extreme N600 Router WZR-600DHP2 uses insufficiently random values for DNS queries

Trust: 0.8

sources: CERT/CC: VU#646008

DESCRIPTION

Buffalo WZR-600DHP2 devices with firmware 2.09, 2.13, and 2.16 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value. Buffalo AirStation Extreme N600 Router WZR-600DHP2, firmware versions 2.09, 2.13, 2.16, and possibly others, uses insufficiently random values for DNS queries and is vulnerable to DNS spoofing attacks. Buffalo Wireless provided by LAN Router WZR-600DHP2 Has the problem of using insufficient random values. Insufficient random value used (CWE-330) - CVE-2015-8262 WZR-600DHP2 Sent from DNS The query source port number is fixed. Also, DNS Used for queries TXID Is 0x0002 It increases gradually and can be predicted from the outside. The attacker DNS By spoofing, LAN It is possible to guide the terminal inside to a malicious server. CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.htmlBy a remote attacker DNS The response is forged, LAN May be directed to a malicious server. Buffalo AirStation Extreme N600 WZR-600DHP2 is a router product of the Buffalo Group in Japan. A security bypass vulnerability exists in the Buffalo AirStation Extreme N600 WZR-600DHP2 Router. An attacker could exploit the vulnerability to bypass security restrictions and gain unauthorized access. This may aid in further attacks

Trust: 3.24

sources: NVD: CVE-2015-8262 // CERT/CC: VU#646008 // JVNDB: JVNDB-2015-006309 // CNVD: CNVD-2015-08281 // BID: 78877 // VULHUB: VHN-86223

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-08281

AFFECTED PRODUCTS

vendor:buffalotechmodel:airstation extreme n600scope:eqversion:2.16

Trust: 1.6

vendor:buffalotechmodel:airstation extreme n600scope:eqversion:2.09

Trust: 1.6

vendor:buffalotechmodel:airstation extreme n600scope:eqversion:2.13

Trust: 1.6

vendor:buffalotechmodel:airstation extreme n600scope:eqversion:*

Trust: 1.0

vendor:buffalomodel: - scope: - version: -

Trust: 0.8

vendor:buffalomodel:wzr-600dhp2scope:eqversion:version 2.09

Trust: 0.8

vendor:buffalomodel:wzr-600dhp2scope:eqversion:version 2.13

Trust: 0.8

vendor:buffalomodel:wzr-600dhp2scope:eqversion:version 2.16

Trust: 0.8

vendor:buffalomodel:airstation extreme n600 wzr-600dhp2scope:eqversion:2.09

Trust: 0.6

vendor:buffalomodel:airstation extreme n600 wzr-600dhp2scope:eqversion:2.13

Trust: 0.6

vendor:buffalomodel:airstation extreme n600 wzr-600dhp2scope:eqversion:2.16

Trust: 0.6

vendor:buffalomodel:technology airstation extreme n600 wzr-600dhp2scope:eqversion:2.16

Trust: 0.3

vendor:buffalomodel:technology airstation extreme n600 wzr-600dhp2scope:eqversion:2.13

Trust: 0.3

vendor:buffalomodel:technology airstation extreme n600 wzr-600dhp2scope:eqversion:2.09

Trust: 0.3

sources: CERT/CC: VU#646008 // CNVD: CNVD-2015-08281 // BID: 78877 // JVNDB: JVNDB-2015-006309 // CNNVD: CNNVD-201512-419 // NVD: CVE-2015-8262

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2015-8262
value: MEDIUM

Trust: 1.6

nvd@nist.gov: CVE-2015-8262
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2015-08281
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201512-419
value: MEDIUM

Trust: 0.6

VULHUB: VHN-86223
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-8262
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2015-8262
severity: MEDIUM
baseScore: 5.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2015-08281
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-86223
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-8262
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 4.0
version: 3.0

Trust: 1.0

sources: CERT/CC: VU#646008 // CNVD: CNVD-2015-08281 // VULHUB: VHN-86223 // JVNDB: JVNDB-2015-006309 // CNNVD: CNNVD-201512-419 // NVD: CVE-2015-8262

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2015-006309 // NVD: CVE-2015-8262

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-419

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201512-419

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006309

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#646008

PATCH

title:AirStation Extreme N600 Routerurl:http://www.buffalotech.com/products/wireless/dual-band-routers/airstation-extreme-n600-router

Trust: 0.8

sources: JVNDB: JVNDB-2015-006309

EXTERNAL IDS

db:CERT/CCid:VU#646008

Trust: 3.6

db:NVDid:CVE-2015-8262

Trust: 3.4

db:BIDid:78877

Trust: 2.6

db:JVNid:JVNVU93831077

Trust: 0.8

db:JVNDBid:JVNDB-2015-006309

Trust: 0.8

db:CNNVDid:CNNVD-201512-419

Trust: 0.7

db:CNVDid:CNVD-2015-08281

Trust: 0.6

db:VULHUBid:VHN-86223

Trust: 0.1

sources: CERT/CC: VU#646008 // CNVD: CNVD-2015-08281 // VULHUB: VHN-86223 // BID: 78877 // JVNDB: JVNDB-2015-006309 // CNNVD: CNNVD-201512-419 // NVD: CVE-2015-8262

REFERENCES

url:https://www.kb.cert.org/vuls/id/646008

Trust: 2.8

url:http://www.securityfocus.com/bid/78877

Trust: 2.3

url:http://www.buffalotech.com/products/wireless/dual-band-routers/airstation-extreme-n600-router

Trust: 0.8

url:http://www.buffalotech.com/support-and-downloads/download/wzr600dhp2-us-217.zip

Trust: 0.8

url:http://www.buffalotech.com/support-and-downloads/download/wzr600dhp2-us-217.txt

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8262

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93831077/index.html

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8262

Trust: 0.8

url:http://www.buffalotech.com/products/wireless/wireless-n-routers-access-points/

Trust: 0.3

sources: CERT/CC: VU#646008 // CNVD: CNVD-2015-08281 // VULHUB: VHN-86223 // BID: 78877 // JVNDB: JVNDB-2015-006309 // CNNVD: CNNVD-201512-419 // NVD: CVE-2015-8262

CREDITS

Joel Land of the CERT/CC

Trust: 0.9

sources: BID: 78877 // CNNVD: CNNVD-201512-419

SOURCES

db:CERT/CCid:VU#646008
db:CNVDid:CNVD-2015-08281
db:VULHUBid:VHN-86223
db:BIDid:78877
db:JVNDBid:JVNDB-2015-006309
db:CNNVDid:CNNVD-201512-419
db:NVDid:CVE-2015-8262

LAST UPDATE DATE

2025-04-13T23:31:32.470000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#646008date:2016-01-25T00:00:00
db:CNVDid:CNVD-2015-08281date:2015-12-17T00:00:00
db:VULHUBid:VHN-86223date:2016-11-28T00:00:00
db:BIDid:78877date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006309date:2016-01-07T00:00:00
db:CNNVDid:CNNVD-201512-419date:2015-12-28T00:00:00
db:NVDid:CVE-2015-8262date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#646008date:2015-12-10T00:00:00
db:CNVDid:CNVD-2015-08281date:2015-12-17T00:00:00
db:VULHUBid:VHN-86223date:2015-12-27T00:00:00
db:BIDid:78877date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006309date:2015-12-14T00:00:00
db:CNNVDid:CNNVD-201512-419date:2015-12-15T00:00:00
db:NVDid:CVE-2015-8262date:2015-12-27T03:59:04.973