ID

VAR-201601-0404


CVE

CVE-2016-1139


TITLE

HOME SPOT CUBE vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2016-000010

DESCRIPTION

Cross-site request forgery (CSRF) vulnerability on KDDI HOME SPOT CUBE devices before 2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. HOME SPOT CUBE provided by KDDI CORPORATION is a wireless LAN router. Masaki Yoshikawa of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary administrative operation such as setting alteration may be executed. A remote attacker could exploit this vulnerability to perform unauthorized operations. KDDI Home Spot Cube is prone to the following security vulnerabilities: Cross-site scripting - CVE-2016-1136 Open redirect - CVE-2016-1137 HTTP header injection - CVE-2016-1138 Cross-site request forgery - CVE-2016-1139 Click jacking - CVE-2016-1140 OS command injection - CVE-2016-1141 Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, or conduct phishing attacks, or inject arbitrary HTTP headers, or execute arbitrary OS commands in context of the affected application,or allow attackers to gain unauthorized access to the affected application or obtain sensitive information, and to to perform certain unauthorized actions. Note- HOME SPOT CUBE2 is not affected by these vulnerabilities

Trust: 2.52

sources: NVD: CVE-2016-1139 // JVNDB: JVNDB-2016-000010 // CNVD: CNVD-2016-00913 // BID: 81982 // VULHUB: VHN-89958

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-00913

AFFECTED PRODUCTS

vendor:kddimodel:home spot cubescope:eqversion:2.0

Trust: 1.6

vendor:kddimodel:home spot cubescope: - version: -

Trust: 0.8

vendor:kddimodel:home spot cube devicesscope:ltversion:2

Trust: 0.6

vendor:kddimodel:home spot cubescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2016-00913 // BID: 81982 // JVNDB: JVNDB-2016-000010 // CNNVD: CNNVD-201601-692 // NVD: CVE-2016-1139

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1139
value: HIGH

Trust: 1.0

IPA: JVNDB-2016-000010
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-00913
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201601-692
value: MEDIUM

Trust: 0.6

VULHUB: VHN-89958
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1139
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2016-000010
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-00913
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-89958
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1139
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 1.0

IPA: JVNDB-2016-000010
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-00913 // VULHUB: VHN-89958 // JVNDB: JVNDB-2016-000010 // CNNVD: CNNVD-201601-692 // NVD: CVE-2016-1139

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-89958 // JVNDB: JVNDB-2016-000010 // NVD: CVE-2016-1139

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-692

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201601-692

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-000010

PATCH

title:Notes on use of HOME SPOT CUBEurl:http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06

Trust: 0.8

title:KDDIHOMESPOTCUBEdevices cross-site request forgery vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/71229

Trust: 0.6

sources: CNVD: CNVD-2016-00913 // JVNDB: JVNDB-2016-000010

EXTERNAL IDS

db:NVDid:CVE-2016-1139

Trust: 3.4

db:JVNid:JVN54686544

Trust: 2.8

db:JVNDBid:JVNDB-2016-000010

Trust: 2.5

db:BIDid:81982

Trust: 0.9

db:CNNVDid:CNNVD-201601-692

Trust: 0.7

db:CNVDid:CNVD-2016-00913

Trust: 0.6

db:VULHUBid:VHN-89958

Trust: 0.1

sources: CNVD: CNVD-2016-00913 // VULHUB: VHN-89958 // BID: 81982 // JVNDB: JVNDB-2016-000010 // CNNVD: CNNVD-201601-692 // NVD: CVE-2016-1139

REFERENCES

url:http://jvn.jp/en/jp/jvn54686544/index.html

Trust: 2.8

url:http://www.au.kddi.com/mobile/service/smartphone/wifi/homespot/#anc06

Trust: 2.0

url:http://jvndb.jvn.jp/jvndb/jvndb-2016-000010

Trust: 1.7

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1139

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1139

Trust: 0.8

sources: CNVD: CNVD-2016-00913 // VULHUB: VHN-89958 // BID: 81982 // JVNDB: JVNDB-2016-000010 // CNNVD: CNNVD-201601-692 // NVD: CVE-2016-1139

CREDITS

Masaki Yoshikawa

Trust: 0.3

sources: BID: 81982

SOURCES

db:CNVDid:CNVD-2016-00913
db:VULHUBid:VHN-89958
db:BIDid:81982
db:JVNDBid:JVNDB-2016-000010
db:CNNVDid:CNNVD-201601-692
db:NVDid:CVE-2016-1139

LAST UPDATE DATE

2025-04-13T23:23:41.838000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-00913date:2016-02-15T00:00:00
db:VULHUBid:VHN-89958date:2016-02-10T00:00:00
db:BIDid:81982date:2016-01-27T00:00:00
db:JVNDBid:JVNDB-2016-000010date:2016-02-16T00:00:00
db:CNNVDid:CNNVD-201601-692date:2016-02-01T00:00:00
db:NVDid:CVE-2016-1139date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-00913date:2016-02-15T00:00:00
db:VULHUBid:VHN-89958date:2016-01-30T00:00:00
db:BIDid:81982date:2016-01-27T00:00:00
db:JVNDBid:JVNDB-2016-000010date:2016-01-27T00:00:00
db:CNNVDid:CNNVD-201601-692date:2016-01-30T00:00:00
db:NVDid:CVE-2016-1139date:2016-01-30T15:59:04.030