ID

VAR-201904-0122


CVE

CVE-2019-9975


TITLE

DASAN H660RM Vulnerabilities related to the use of hard-coded credentials in device firmware

Trust: 0.8

sources: JVNDB: JVNDB-2019-003423

DESCRIPTION

DASAN H660RM devices with firmware 1.03-0022 use a hard-coded key for logs encryption. Data stored using this key can be decrypted by anyone able to access this key. DASAN H660RM is a GPON optical network terminal equipment produced by Korea DASAN Company. A trust management issue vulnerability exists in DASAN H660RM with firmware version 1.03-0022. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components

Trust: 1.71

sources: NVD: CVE-2019-9975 // JVNDB: JVNDB-2019-003423 // VULHUB: VHN-161410

AFFECTED PRODUCTS

vendor:dasannetworksmodel:h660rmscope:eqversion:1.03-0022

Trust: 1.0

vendor:dasanmodel:h660rmscope:eqversion:1.03-0022

Trust: 0.8

sources: JVNDB: JVNDB-2019-003423 // NVD: CVE-2019-9975

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9975
value: HIGH

Trust: 1.0

NVD: CVE-2019-9975
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201903-1030
value: HIGH

Trust: 0.6

VULHUB: VHN-161410
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-9975
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-161410
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-9975
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-161410 // JVNDB: JVNDB-2019-003423 // CNNVD: CNNVD-201903-1030 // NVD: CVE-2019-9975

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-161410 // JVNDB: JVNDB-2019-003423 // NVD: CVE-2019-9975

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201903-1030

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201903-1030

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003423

PATCH

title:Top Pageurl:http://www.dasannetworks.com/en/

Trust: 0.8

sources: JVNDB: JVNDB-2019-003423

EXTERNAL IDS

db:NVDid:CVE-2019-9975

Trust: 2.5

db:PACKETSTORMid:152232

Trust: 1.7

db:JVNDBid:JVNDB-2019-003423

Trust: 0.8

db:CNNVDid:CNNVD-201903-1030

Trust: 0.7

db:VULHUBid:VHN-161410

Trust: 0.1

sources: VULHUB: VHN-161410 // JVNDB: JVNDB-2019-003423 // CNNVD: CNNVD-201903-1030 // NVD: CVE-2019-9975

REFERENCES

url:https://blog.burghardt.pl/2019/03/syslog_tool-cgi-on-dasan-h660rm-devices-with-firmware-1-03-0022-uses-a-hard-coded-key-for-logs-encryption/

Trust: 2.5

url:http://packetstormsecurity.com/files/152232/dasan-h660rm-information-disclosure-hardcoded-key.html

Trust: 2.3

url:https://seclists.org/bugtraq/2019/mar/41

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-9975

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9975

Trust: 0.8

sources: VULHUB: VHN-161410 // JVNDB: JVNDB-2019-003423 // CNNVD: CNNVD-201903-1030 // NVD: CVE-2019-9975

CREDITS

Krzysztof Burghardt

Trust: 0.6

sources: CNNVD: CNNVD-201903-1030

SOURCES

db:VULHUBid:VHN-161410
db:JVNDBid:JVNDB-2019-003423
db:CNNVDid:CNNVD-201903-1030
db:NVDid:CVE-2019-9975

LAST UPDATE DATE

2024-11-23T22:12:07.577000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161410date:2019-04-12T00:00:00
db:JVNDBid:JVNDB-2019-003423date:2019-05-16T00:00:00
db:CNNVDid:CNNVD-201903-1030date:2019-04-19T00:00:00
db:NVDid:CVE-2019-9975date:2024-11-21T04:52:42.890

SOURCES RELEASE DATE

db:VULHUBid:VHN-161410date:2019-04-11T00:00:00
db:JVNDBid:JVNDB-2019-003423date:2019-05-16T00:00:00
db:CNNVDid:CNNVD-201903-1030date:2019-03-26T00:00:00
db:NVDid:CVE-2019-9975date:2019-04-11T19:29:01.567