ID

VAR-201604-0382


CVE

CVE-2016-1167


TITLE

NEC Aterm WG300HP Cross-Site Request Forgery Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2016-01963 // CNNVD: CNNVD-201603-429

DESCRIPTION

Cross-site request forgery (CSRF) vulnerability on NEC Aterm WG300HP devices allows remote attackers to hijack the authentication of arbitrary users. Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, unintended operations may be performed. NECAtermWG300HP is a wireless router product from NEC. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. Aterm WG300HP is vulnerable; other versions may also be affected

Trust: 2.52

sources: NVD: CVE-2016-1167 // JVNDB: JVNDB-2016-000036 // CNVD: CNVD-2016-01963 // BID: 85741 // VULHUB: VHN-89986

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01963

AFFECTED PRODUCTS

vendor:atermmodel:wg300hpscope:lteversion:1.0.8

Trust: 1.0

vendor:necmodel:aterm wg300hpscope: - version: -

Trust: 0.8

vendor:necmodel:wg300hpscope: - version: -

Trust: 0.6

vendor:atermmodel:wg300hpscope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2016-01963 // JVNDB: JVNDB-2016-000036 // CNNVD: CNNVD-201603-429 // NVD: CVE-2016-1167

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1167
value: HIGH

Trust: 1.0

IPA: JVNDB-2016-000036
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-01963
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201603-429
value: MEDIUM

Trust: 0.6

VULHUB: VHN-89986
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1167
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2016-000036
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-01963
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-89986
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1167
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

IPA: JVNDB-2016-000036
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-01963 // VULHUB: VHN-89986 // JVNDB: JVNDB-2016-000036 // CNNVD: CNNVD-201603-429 // NVD: CVE-2016-1167

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-89986 // JVNDB: JVNDB-2016-000036 // NVD: CVE-2016-1167

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-429

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201603-429

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-000036

PATCH

title:Aterm Security Advisory [Update:2016/04/06]url:http://www.aterm.jp/support/tech/2016/0330.html

Trust: 0.8

title:NV16-005url:http://jpn.nec.com/security-info/secinfo/nv16-005.html

Trust: 0.8

title:NEC Aterm WG300HP Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60723

Trust: 0.6

sources: JVNDB: JVNDB-2016-000036 // CNNVD: CNNVD-201603-429

EXTERNAL IDS

db:NVDid:CVE-2016-1167

Trust: 3.4

db:JVNid:JVN82020528

Trust: 3.1

db:JVNDBid:JVNDB-2016-000036

Trust: 3.1

db:CNNVDid:CNNVD-201603-429

Trust: 0.7

db:CNVDid:CNVD-2016-01963

Trust: 0.6

db:BIDid:85741

Trust: 0.4

db:VULHUBid:VHN-89986

Trust: 0.1

sources: CNVD: CNVD-2016-01963 // VULHUB: VHN-89986 // BID: 85741 // JVNDB: JVNDB-2016-000036 // CNNVD: CNNVD-201603-429 // NVD: CVE-2016-1167

REFERENCES

url:http://jvn.jp/en/jp/jvn82020528/index.html

Trust: 3.1

url:http://jpn.nec.com/security-info/secinfo/nv16-005.html

Trust: 1.7

url:http://jvndb.jvn.jp/jvndb/jvndb-2016-000036

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1167

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1167

Trust: 0.8

url:http://jvndb.jvn.jp/en/contents/2016/jvndb-2016-000036.html

Trust: 0.6

sources: CNVD: CNVD-2016-01963 // VULHUB: VHN-89986 // JVNDB: JVNDB-2016-000036 // CNNVD: CNNVD-201603-429 // NVD: CVE-2016-1167

CREDITS

Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc.

Trust: 0.9

sources: BID: 85741 // CNNVD: CNNVD-201603-429

SOURCES

db:CNVDid:CNVD-2016-01963
db:VULHUBid:VHN-89986
db:BIDid:85741
db:JVNDBid:JVNDB-2016-000036
db:CNNVDid:CNNVD-201603-429
db:NVDid:CVE-2016-1167

LAST UPDATE DATE

2025-04-13T23:03:06.580000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01963date:2016-04-01T00:00:00
db:VULHUBid:VHN-89986date:2016-04-01T00:00:00
db:BIDid:85741date:2016-03-30T00:00:00
db:JVNDBid:JVNDB-2016-000036date:2016-04-18T00:00:00
db:CNNVDid:CNNVD-201603-429date:2016-04-05T00:00:00
db:NVDid:CVE-2016-1167date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01963date:2016-04-01T00:00:00
db:VULHUBid:VHN-89986date:2016-04-01T00:00:00
db:BIDid:85741date:2016-03-30T00:00:00
db:JVNDBid:JVNDB-2016-000036date:2016-03-30T00:00:00
db:CNNVDid:CNNVD-201603-429date:2016-03-31T00:00:00
db:NVDid:CVE-2016-1167date:2016-04-01T14:59:00.123