ID

VAR-202104-1672


CVE

CVE-2021-3511


TITLE

Multiple vulnerabilities in Buffalo routers

Trust: 0.8

sources: JVNDB: JVNDB-2021-001381

DESCRIPTION

Disclosure of sensitive information to an unauthorized user vulnerability in Buffalo broadband routers (BHR-4GRV firmware Ver.1.99 and prior, DWR-HP-G300NH firmware Ver.1.83 and prior, HW-450HP-ZWE firmware Ver.1.99 and prior, WHR-300HP firmware Ver.1.99 and prior, WHR-300 firmware Ver.1.99 and prior, WHR-G301N firmware Ver.1.86 and prior, WHR-HP-G300N firmware Ver.1.99 and prior, WHR-HP-GN firmware Ver.1.86 and prior, WPL-05G300 firmware Ver.1.87 and prior, WZR-450HP-CWT firmware Ver.1.99 and prior, WZR-450HP-UB firmware Ver.1.99 and prior, WZR-HP-AG300H firmware Ver.1.75 and prior, WZR-HP-G300NH firmware Ver.1.83 and prior, WZR-HP-G301NH firmware Ver.1.83 and prior, WZR-HP-G302H firmware Ver.1.85 and prior, WZR-HP-G450H firmware Ver.1.89 and prior, WZR-300HP firmware Ver.1.99 and prior, WZR-450HP firmware Ver.1.99 and prior, WZR-600DHP firmware Ver.1.99 and prior, WZR-D1100H firmware Ver.1.99 and prior, FS-HP-G300N firmware Ver.3.32 and prior, FS-600DHP firmware Ver.3.38 and prior, FS-R600DHP firmware Ver.3.39 and prior, and FS-G300N firmware Ver.3.13 and prior) allows remote unauthenticated attackers to obtain information such as configuration via unspecified vectors. The following vulnerabilities exist in multiple router products provided by Buffalo Inc. * information leak (CWE-200) - CVE-2021-3511 ‥ * telnet Inadequate access control to services (CWE-284) - CVE-2021-3512 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * The setting information of the device is stolen by a third party on the adjacent network. - CVE-2021-3511 ‥ * By a third party on the adjacent network, the device telnet Service enabled, root Arbitrary with authority OS Command is executed - CVE-2021-3512. Buffalo 固件是日本Buffalo公司的一个网络设备

Trust: 2.25

sources: NVD: CVE-2021-3511 // JVNDB: JVNDB-2021-001381 // CNNVD: CNNVD-202104-1998 // VULMON: CVE-2021-3511

AFFECTED PRODUCTS

vendor:buffalomodel:dwr-hp-g300nhscope:ltversion:1.84

Trust: 1.0

vendor:buffalomodel:fs-g300nscope:ltversion:3.14

Trust: 1.0

vendor:buffalomodel:whr-300scope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:whr-300hpscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-450hp-ubscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-hp-g301nhscope:ltversion:1.84

Trust: 1.0

vendor:buffalomodel:wzr-hp-g302hscope:ltversion:1.86

Trust: 1.0

vendor:buffalomodel:fs-r600dhpscope:ltversion:3.40

Trust: 1.0

vendor:buffalomodel:wzr-450hp-cwtscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:whr-hp-gnscope:ltversion:1.87

Trust: 1.0

vendor:buffalomodel:wzr-hp-g300nhscope:ltversion:1.84

Trust: 1.0

vendor:buffalomodel:wzr-hp-g450hscope:ltversion:1.90

Trust: 1.0

vendor:buffalomodel:fs-hp-g300nscope:ltversion:3.33

Trust: 1.0

vendor:buffalomodel:whr-hp-g300nscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-300hpscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:hw-450hp-zwescope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-450hpscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:wpl-05g300scope:ltversion:1.88

Trust: 1.0

vendor:buffalomodel:wzr-600dhpscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-hp-ag300hscope:ltversion:1.76

Trust: 1.0

vendor:buffalomodel:wzr-d1100hscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:bhr-4grvscope:ltversion:2.00

Trust: 1.0

vendor:buffalomodel:fs-600dhpscope:ltversion:3.40

Trust: 1.0

vendor:buffalomodel:whr-g301nscope:ltversion:1.87

Trust: 1.0

vendor:バッファローmodel:bhr-4grvscope: - version: -

Trust: 0.8

vendor:バッファローmodel:dwr-hp-g300nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-600dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-hp-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-r600dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:hw-450hp-zwescope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-300hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-300scope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-g301nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-hp-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-hp-gnscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wpl-05g300scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-300hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-450hp-cwtscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-450hp-ubscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-450hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-600dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-d1100hscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-ag300hscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g300nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g301nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g302hscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g450hscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-001381 // NVD: CVE-2021-3511

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-3511
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2021-001381
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202104-1998
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-3511
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2021-3511
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-001381
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-001381 // CNNVD: CNNVD-202104-1998 // NVD: CVE-2021-3511

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:information leak (CWE-200) [IPA Evaluation ]

Trust: 0.8

problemtype: Inappropriate access control (CWE-284) [IPA Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-001381 // NVD: CVE-2021-3511

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202104-1998

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-1998

PATCH

title:Multiple vulnerabilities in some router products and how to deal with themurl:https://www.buffalo.jp/news/detail/20210427-01.html

Trust: 0.8

title:Buffalo broadband routers Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=150356

Trust: 0.6

sources: JVNDB: JVNDB-2021-001381 // CNNVD: CNNVD-202104-1998

EXTERNAL IDS

db:JVNid:JVNVU99235714

Trust: 2.5

db:NVDid:CVE-2021-3511

Trust: 2.5

db:JVNDBid:JVNDB-2021-001381

Trust: 1.4

db:CNNVDid:CNNVD-202104-1998

Trust: 0.6

db:VULMONid:CVE-2021-3511

Trust: 0.1

sources: VULMON: CVE-2021-3511 // JVNDB: JVNDB-2021-001381 // CNNVD: CNNVD-202104-1998 // NVD: CVE-2021-3511

REFERENCES

url:https://jvn.jp/en/vu/jvnvu99235714/index.html

Trust: 1.7

url:https://www.buffalo.jp/news/detail/20210427-01.html

Trust: 1.7

url:http://jvn.jp/cert/jvnvu99235714

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-3511

Trust: 0.6

url:https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-001381.html

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-3511 // JVNDB: JVNDB-2021-001381 // CNNVD: CNNVD-202104-1998 // NVD: CVE-2021-3511

SOURCES

db:VULMONid:CVE-2021-3511
db:JVNDBid:JVNDB-2021-001381
db:CNNVDid:CNNVD-202104-1998
db:NVDid:CVE-2021-3511

LAST UPDATE DATE

2024-11-23T22:25:04.558000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-3511date:2021-04-28T00:00:00
db:JVNDBid:JVNDB-2021-001381date:2021-05-07T07:26:00
db:CNNVDid:CNNVD-202104-1998date:2022-07-14T00:00:00
db:NVDid:CVE-2021-3511date:2024-11-21T06:21:43.167

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-3511date:2021-04-28T00:00:00
db:JVNDBid:JVNDB-2021-001381date:2021-04-28T00:00:00
db:CNNVDid:CNNVD-202104-1998date:2021-04-27T00:00:00
db:NVDid:CVE-2021-3511date:2021-04-28T01:15:17.153