ID

VAR-201908-0564


CVE

CVE-2019-13270


TITLE

Edimax BR-6208AC V1 device Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-008818

DESCRIPTION

Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender. Edimax BR-6208AC V1 device Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Edimax BR-6208AC is a wireless concurrent dual-band router. Edimax BR-6208AC V1 has a hidden channel vulnerability across routers. Edimax Technology BR-6208AC is a wireless router manufactured by Edimax Technology, Taiwan, China. An attacker could exploit this vulnerability by sending specially crafted IGMP Membership Query packets to transmit data between two isolated network segments on the same device

Trust: 2.25

sources: NVD: CVE-2019-13270 // JVNDB: JVNDB-2019-008818 // CNVD: CNVD-2019-30061 // VULHUB: VHN-145100

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-30061

AFFECTED PRODUCTS

vendor:edimaxmodel:br-6208ac v1scope:eqversion: -

Trust: 1.0

vendor:edimaxmodel:br-6208ac v1scope: - version: -

Trust: 0.8

vendor:edimaxmodel:br-6208acscope:eqversion:v1

Trust: 0.6

sources: CNVD: CNVD-2019-30061 // JVNDB: JVNDB-2019-008818 // NVD: CVE-2019-13270

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-13270
value: HIGH

Trust: 1.0

NVD: CVE-2019-13270
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-30061
value: LOW

Trust: 0.6

CNNVD: CNNVD-201908-2082
value: HIGH

Trust: 0.6

VULHUB: VHN-145100
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-13270
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-30061
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-145100
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-13270
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-30061 // VULHUB: VHN-145100 // JVNDB: JVNDB-2019-008818 // CNNVD: CNNVD-201908-2082 // NVD: CVE-2019-13270

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-145100 // JVNDB: JVNDB-2019-008818 // NVD: CVE-2019-13270

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201908-2082

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201908-2082

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-008818

PATCH

title:Top Pageurl:https://www.edimax.com/edimax/global/

Trust: 0.8

sources: JVNDB: JVNDB-2019-008818

EXTERNAL IDS

db:NVDid:CVE-2019-13270

Trust: 3.1

db:JVNDBid:JVNDB-2019-008818

Trust: 0.8

db:CNNVDid:CNNVD-201908-2082

Trust: 0.7

db:CNVDid:CNVD-2019-30061

Trust: 0.6

db:VULHUBid:VHN-145100

Trust: 0.1

sources: CNVD: CNVD-2019-30061 // VULHUB: VHN-145100 // JVNDB: JVNDB-2019-008818 // CNNVD: CNNVD-201908-2082 // NVD: CVE-2019-13270

REFERENCES

url:https://www.usenix.org/system/files/woot19-paper_ovadia.pdf

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-13270

Trust: 2.0

url:https://orenlab.sise.bgu.ac.il/publications/crossrouter

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13270

Trust: 0.8

sources: CNVD: CNVD-2019-30061 // VULHUB: VHN-145100 // JVNDB: JVNDB-2019-008818 // CNNVD: CNNVD-201908-2082 // NVD: CVE-2019-13270

SOURCES

db:CNVDid:CNVD-2019-30061
db:VULHUBid:VHN-145100
db:JVNDBid:JVNDB-2019-008818
db:CNNVDid:CNNVD-201908-2082
db:NVDid:CVE-2019-13270

LAST UPDATE DATE

2024-11-23T22:55:29.372000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-30061date:2019-09-03T00:00:00
db:VULHUBid:VHN-145100date:2019-09-04T00:00:00
db:JVNDBid:JVNDB-2019-008818date:2019-09-06T00:00:00
db:CNNVDid:CNNVD-201908-2082date:2019-09-05T00:00:00
db:NVDid:CVE-2019-13270date:2024-11-21T04:24:35.483

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-30061date:2019-09-03T00:00:00
db:VULHUBid:VHN-145100date:2019-08-27T00:00:00
db:JVNDBid:JVNDB-2019-008818date:2019-09-06T00:00:00
db:CNNVDid:CNNVD-201908-2082date:2019-08-27T00:00:00
db:NVDid:CVE-2019-13270date:2019-08-27T18:15:11.090