ID

VAR-201901-0796


CVE

CVE-2018-16198


TITLE

Multiple vulnerabilities in Toshiba Lighting & Technology Corporation Home gateway

Trust: 0.8

sources: JVNDB: JVNDB-2018-000132

DESCRIPTION

Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier may allow an attacker on the same network segment to access a non-documented developer screen to perform operations on the affected device. Home gateway provided by Toshiba Lighting & Technology Corporation contains multiple vulnerabilities listed below. * Improper access control (CWE-284) - CVE-2018-16197 * Hidden functionality (CWE-912) - CVE-2018-16198 * Cross-site scripting (CWE-79) - CVE-2018-16199 * OS command injection (CWE-78) - CVE-2018-16200 * Hard-coded credentials (CWE-798) - CVE-2018-16201 The following researchers reported the vulnerabilities to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership. CVE-2018-16197 Toshitsugu Yoneyama, Yutaka Kokubu, and Daiki Ichinose of Mitsui Bussan Secure Directions, Inc. CVE-2018-16198, CVE-2018-16199 Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. CVE-2018-16200, CVE-2018-16201 Yutaka Kokubu of Mitsui Bussan Secure Directions, Inc.* The information and files stored on the affected device may be accessed. - CVE-2018-16197, CVE-2018-16201 * The affected device may be operated by an attacker. - CVE-2018-16198, CVE-2018-16201 * An arbitrary script may be executed on the user's web browser. - CVE-2018-16199 * An arbitrary OS command may be executed on the affected device. - CVE-2018-16200, CVE-2018-16201. TOSHIBA Home Gateway HEM-GW26A and TOSHIBA Home Gateway HEM-GW16A are home gateway products of Japan Toshiba (TOSHIBA)

Trust: 1.71

sources: NVD: CVE-2018-16198 // JVNDB: JVNDB-2018-000132 // VULHUB: VHN-126533

AFFECTED PRODUCTS

vendor:toshibamodel:hem-gw26ascope:lteversion:1.2.9

Trust: 1.0

vendor:toshibamodel:hem-gw16ascope:lteversion:1.2.9

Trust: 1.0

vendor:toshiba lightingmodel:home gateway hem-gw16ascope:lteversion:1.2.9

Trust: 0.8

vendor:toshiba lightingmodel:home gateway hem-gw26ascope:lteversion:1.2.9

Trust: 0.8

sources: JVNDB: JVNDB-2018-000132 // NVD: CVE-2018-16198

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2018-000132
value: HIGH

Trust: 2.4

IPA: JVNDB-2018-000132
value: MEDIUM

Trust: 1.6

nvd@nist.gov: CVE-2018-16198
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201812-808
value: HIGH

Trust: 0.6

VULHUB: VHN-126533
value: MEDIUM

Trust: 0.1

IPA: JVNDB-2018-000132
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.4

nvd@nist.gov: CVE-2018-16198
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2018-000132
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2018-000132
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-126533
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

IPA: JVNDB-2018-000132
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 2.4

nvd@nist.gov: CVE-2018-16198
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

IPA: JVNDB-2018-000132
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2018-000132
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-126533 // JVNDB: JVNDB-2018-000132 // JVNDB: JVNDB-2018-000132 // JVNDB: JVNDB-2018-000132 // JVNDB: JVNDB-2018-000132 // JVNDB: JVNDB-2018-000132 // CNNVD: CNNVD-201812-808 // NVD: CVE-2018-16198

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

problemtype:CWE-78

Trust: 0.8

problemtype:CWE-Other

Trust: 0.8

problemtype:CWE-79

Trust: 0.8

problemtype:CWE-255

Trust: 0.8

sources: VULHUB: VHN-126533 // JVNDB: JVNDB-2018-000132 // NVD: CVE-2018-16198

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201812-808

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201812-808

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-000132

PATCH

title:Toshiba Lighting & Technology Corporation websiteurl:http://www.tlt.co.jp/tlt/information/seihin/notice/defect/20181219/20181219.htm

Trust: 0.8

title:TOSHIBA Home Gateway HEM-GW26A and TOSHIBA Home Gateway HEM-GW16A Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88004

Trust: 0.6

sources: JVNDB: JVNDB-2018-000132 // CNNVD: CNNVD-201812-808

EXTERNAL IDS

db:JVNid:JVN99810718

Trust: 2.5

db:NVDid:CVE-2018-16198

Trust: 2.5

db:JVNDBid:JVNDB-2018-000132

Trust: 0.8

db:CNNVDid:CNNVD-201812-808

Trust: 0.7

db:VULHUBid:VHN-126533

Trust: 0.1

sources: VULHUB: VHN-126533 // JVNDB: JVNDB-2018-000132 // CNNVD: CNNVD-201812-808 // NVD: CVE-2018-16198

REFERENCES

url:https://jvn.jp/en/jp/jvn99810718/index.html

Trust: 2.5

url:http://www.tlt.co.jp/tlt/information/seihin/notice/defect/20181219/20181219.htm

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16201

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16197

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16198

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16199

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16200

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16197

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16198

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16199

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16200

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16201

Trust: 0.8

sources: VULHUB: VHN-126533 // JVNDB: JVNDB-2018-000132 // CNNVD: CNNVD-201812-808 // NVD: CVE-2018-16198

SOURCES

db:VULHUBid:VHN-126533
db:JVNDBid:JVNDB-2018-000132
db:CNNVDid:CNNVD-201812-808
db:NVDid:CVE-2018-16198

LAST UPDATE DATE

2024-11-23T22:17:08.824000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-126533date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2018-000132date:2019-08-28T00:00:00
db:CNNVDid:CNNVD-201812-808date:2019-10-23T00:00:00
db:NVDid:CVE-2018-16198date:2024-11-21T03:52:16.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-126533date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2018-000132date:2018-12-19T00:00:00
db:CNNVDid:CNNVD-201812-808date:2018-12-20T00:00:00
db:NVDid:CVE-2018-16198date:2019-01-09T23:29:04.683