ID

VAR-201605-0314


CVE

CVE-2016-1206


TITLE

WN-GDN/R3 Series does not limit authentication attempts

Trust: 0.8

sources: JVNDB: JVNDB-2016-000061

DESCRIPTION

The WPS implementation on I-O DATA DEVICE WN-GDN/R3, WN-GDN/R3-C, WN-GDN/R3-S, and WN-GDN/R3-U devices does not limit PIN guesses, which allows remote attackers to obtain network access via a brute-force attack. WN-GDN/R3 Series provided by I-O DATA DEVICE, INC. does not limit authentication attempts. WN-GDN/R3 series provided by I-O DATA DEVICE, INC. is a wireless LAN router. WPS functionality in WN-GDN/R3 Series does not limit PIN authentication attempts, making it susceptible to brute force attacks. Takeshi Okamoto of Kanagawa Institute of Technology and Takaaki Minegishi reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An unauthenticated attacker within wireless range of the device may perform a brute force attack to recover the PIN. Using the recovered PIN, the attacker may gain access to the network. WN-GDN/R3 Series Routers are prone to an authentication-bypass vulnerability. Successfully exploiting this issue may lead to further attacks. The following products are affected: WN-GDN/R3 WN-GDN/R3-S WN-GDN/R3-U WN-GDN/R3-C. There are security vulnerabilities in the WPS implementation of several IO DATA DEVICE products

Trust: 2.52

sources: NVD: CVE-2016-1206 // JVNDB: JVNDB-2016-000061 // CNVD: CNVD-2016-03198 // BID: 90613 // VULHUB: VHN-90025

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-03198

AFFECTED PRODUCTS

vendor:iodatamodel:wn-gdn\/r3scope:eqversion: -

Trust: 1.6

vendor:i o data devicemodel:wn-gdn/r3scope: - version: -

Trust: 0.8

vendor:i o data devicemodel:wn-gdn/r3-cscope: - version: -

Trust: 0.8

vendor:i o data devicemodel:wn-gdn/r3-sscope: - version: -

Trust: 0.8

vendor:i o data devicemodel:wn-gdn/r3-uscope: - version: -

Trust: 0.8

vendor:i omodel:data device wn-gdn/r3scope: - version: -

Trust: 0.6

vendor:i omodel:data device wn-gdn/r3-cscope: - version: -

Trust: 0.6

vendor:i omodel:data device wn-gdn/r3-sscope: - version: -

Trust: 0.6

vendor:i omodel:data device wn-gdn/r3-uscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2016-03198 // JVNDB: JVNDB-2016-000061 // CNNVD: CNNVD-201605-376 // NVD: CVE-2016-1206

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1206
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2016-000061
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-03198
value: LOW

Trust: 0.6

CNNVD: CNNVD-201605-376
value: LOW

Trust: 0.6

VULHUB: VHN-90025
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2016-1206
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2016-000061
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-03198
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90025
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1206
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 1.0

IPA: JVNDB-2016-000061
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-03198 // VULHUB: VHN-90025 // JVNDB: JVNDB-2016-000061 // CNNVD: CNNVD-201605-376 // NVD: CVE-2016-1206

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

problemtype:CWE-287

Trust: 0.8

sources: VULHUB: VHN-90025 // JVNDB: JVNDB-2016-000061 // NVD: CVE-2016-1206

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201605-376

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201605-376

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-000061

PATCH

title:I-O DATA DEVICE, INC. websiteurl:http://www.iodata.jp/support/information/2016/wn-gdnr3_bfa/

Trust: 0.8

title:Manual - Settings screenurl:http://www.iodata.jp/lib/manual/wn-gdn_r3_h01/htm2/set06.htm

Trust: 0.8

title:Patches for multiple I-ODATADEVICE product PIN recovery vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/75962

Trust: 0.6

sources: CNVD: CNVD-2016-03198 // JVNDB: JVNDB-2016-000061

EXTERNAL IDS

db:NVDid:CVE-2016-1206

Trust: 3.4

db:JVNid:JVN25674893

Trust: 3.1

db:JVNDBid:JVNDB-2016-000061

Trust: 2.5

db:CNVDid:CNVD-2016-03198

Trust: 0.6

db:CNNVDid:CNNVD-201605-376

Trust: 0.6

db:BIDid:90613

Trust: 0.4

db:VULHUBid:VHN-90025

Trust: 0.1

sources: CNVD: CNVD-2016-03198 // VULHUB: VHN-90025 // BID: 90613 // JVNDB: JVNDB-2016-000061 // CNNVD: CNNVD-201605-376 // NVD: CVE-2016-1206

REFERENCES

url:http://jvn.jp/en/jp/jvn25674893/index.html

Trust: 3.1

url:http://www.iodata.jp/support/information/2016/wn-gdnr3_bfa/

Trust: 1.7

url:http://jvndb.jvn.jp/jvndb/jvndb-2016-000061

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1206

Trust: 0.8

url:https://jvn.jp/vu/jvnvu723755/

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1206

Trust: 0.8

url:http://jvndb.jvn.jp/en/contents/2016/jvndb-2016-000061.html

Trust: 0.6

sources: CNVD: CNVD-2016-03198 // VULHUB: VHN-90025 // JVNDB: JVNDB-2016-000061 // CNNVD: CNNVD-201605-376 // NVD: CVE-2016-1206

CREDITS

Takeshi Okamoto of Kanagawa Institute of Technology and Takaaki Minegishi.

Trust: 0.3

sources: BID: 90613

SOURCES

db:CNVDid:CNVD-2016-03198
db:VULHUBid:VHN-90025
db:BIDid:90613
db:JVNDBid:JVNDB-2016-000061
db:CNNVDid:CNNVD-201605-376
db:NVDid:CVE-2016-1206

LAST UPDATE DATE

2025-04-13T23:23:36.297000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-03198date:2016-05-17T00:00:00
db:VULHUBid:VHN-90025date:2016-05-18T00:00:00
db:BIDid:90613date:2016-05-12T00:00:00
db:JVNDBid:JVNDB-2016-000061date:2016-06-01T00:00:00
db:CNNVDid:CNNVD-201605-376date:2016-05-16T00:00:00
db:NVDid:CVE-2016-1206date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-03198date:2016-05-17T00:00:00
db:VULHUBid:VHN-90025date:2016-05-14T00:00:00
db:BIDid:90613date:2016-05-12T00:00:00
db:JVNDBid:JVNDB-2016-000061date:2016-05-12T00:00:00
db:CNNVDid:CNNVD-201605-376date:2016-05-13T00:00:00
db:NVDid:CVE-2016-1206date:2016-05-14T16:59:00.133