ID

VAR-202106-0641


CVE

CVE-2021-20730


TITLE

Buffalo router  WSR-1166DHP3  and  WSR-1166DHP4  Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2021-001575

DESCRIPTION

Improper access control vulnerability in WSR-1166DHP3 firmware Ver.1.16 and prior and WSR-1166DHP4 firmware Ver.1.02 and prior allows an attacker to obtain configuration information via unspecified vectors. Provided by Buffalo Inc. WSR-1166DHP3 and WSR-1166DHP4 The following multiple vulnerabilities exist in. * Inadequate access restrictions (CWE-284) - CVE-2021-20730 ‥ * OS Command injection (CWE-78) - CVE-2021-20731 The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Reporter : Zero Zero One Co., Ltd. Hayakawa Soraya MrThe expected impact depends on each vulnerability, but it may be affected as follows. * Device configuration information stolen by an attacker on an adjacent network - CVE-2021-20730 ‥ * By an attacker on an adjacent network root Some with authority OS Command is executed - CVE-2021-20731. in Japan. Buffalo WSR-1166DHP3 and WSR-1166DHP4 have an access control error vulnerability

Trust: 2.25

sources: NVD: CVE-2021-20730 // JVNDB: JVNDB-2021-001575 // CNVD: CNVD-2021-56798 // VULMON: CVE-2021-20730

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-56798

AFFECTED PRODUCTS

vendor:buffalomodel:wsr-1166dhp4scope:lteversion:1.02

Trust: 1.0

vendor:buffalomodel:wsr-1166dhp3scope:lteversion:1.16

Trust: 1.0

vendor:バッファローmodel:wsr-1166dhp4scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wsr-1166dhp3scope: - version: -

Trust: 0.8

vendor:buffalomodel:wsr-1166dhp3scope:lteversion:<=1.16

Trust: 0.6

vendor:buffalomodel:wsr-1166dhp4scope:lteversion:<=1.02

Trust: 0.6

sources: CNVD: CNVD-2021-56798 // JVNDB: JVNDB-2021-001575 // NVD: CVE-2021-20730

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-20730
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2021-001575
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-56798
value: LOW

Trust: 0.6

CNNVD: CNNVD-202105-2004
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-20730
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-20730
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2021-56798
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-20730
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-001575
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-56798 // VULMON: CVE-2021-20730 // JVNDB: JVNDB-2021-001575 // CNNVD: CNNVD-202105-2004 // NVD: CVE-2021-20730

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:Inappropriate access control (CWE-284) [IPA Evaluation ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [IPA Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-001575 // NVD: CVE-2021-20730

TYPE

Improper access control

Trust: 0.6

sources: CNNVD: CNNVD-202105-2004

PATCH

title:WSR-1166DHP4/WSR-1166DHP3  Multiple vulnerabilities inurl:https://www.buffalo.jp/news/detail/20210531-01.html

Trust: 0.8

title:Patch for Buffalo WSR-1166DHP3 and WSR-1166DHP4 access control error vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/283466

Trust: 0.6

title:BUFFALO INC WSR-1166DHP3-BK Repair measures for improper access control vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=153498

Trust: 0.6

sources: CNVD: CNVD-2021-56798 // JVNDB: JVNDB-2021-001575 // CNNVD: CNNVD-202105-2004

EXTERNAL IDS

db:NVDid:CVE-2021-20730

Trust: 3.1

db:JVNid:JVNVU92862829

Trust: 2.5

db:JVNDBid:JVNDB-2021-001575

Trust: 1.4

db:CNVDid:CNVD-2021-56798

Trust: 0.6

db:CNNVDid:CNNVD-202105-2004

Trust: 0.6

db:VULMONid:CVE-2021-20730

Trust: 0.1

sources: CNVD: CNVD-2021-56798 // VULMON: CVE-2021-20730 // JVNDB: JVNDB-2021-001575 // CNNVD: CNNVD-202105-2004 // NVD: CVE-2021-20730

REFERENCES

url:https://www.buffalo.jp/news/detail/20210531-01.html

Trust: 2.3

url:https://jvn.jp/en/vu/jvnvu92862829/index.html

Trust: 1.7

url:http://jvn.jp/cert/jvnvu92862829

Trust: 0.8

url:https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-001575.html

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-56798 // VULMON: CVE-2021-20730 // JVNDB: JVNDB-2021-001575 // CNNVD: CNNVD-202105-2004 // NVD: CVE-2021-20730

SOURCES

db:CNVDid:CNVD-2021-56798
db:VULMONid:CVE-2021-20730
db:JVNDBid:JVNDB-2021-001575
db:CNNVDid:CNNVD-202105-2004
db:NVDid:CVE-2021-20730

LAST UPDATE DATE

2024-08-14T14:03:09.075000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-56798date:2021-07-30T00:00:00
db:VULMONid:CVE-2021-20730date:2021-06-17T00:00:00
db:JVNDBid:JVNDB-2021-001575date:2021-06-01T03:28:00
db:CNNVDid:CNNVD-202105-2004date:2021-06-10T00:00:00
db:NVDid:CVE-2021-20730date:2022-06-28T14:11:45.273

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-56798date:2021-07-30T00:00:00
db:VULMONid:CVE-2021-20730date:2021-06-09T00:00:00
db:JVNDBid:JVNDB-2021-001575date:2021-06-01T00:00:00
db:CNNVDid:CNNVD-202105-2004date:2021-05-31T00:00:00
db:NVDid:CVE-2021-20730date:2021-06-09T02:15:06.750