ID

VAR-202210-0051


CVE

CVE-2022-34840


TITLE

Multiple vulnerabilities in Buffalo network equipment

Trust: 0.8

sources: JVNDB: JVNDB-2022-002444

DESCRIPTION

Use of hard-coded credentials vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to alter?configuration settings of the device. The affected products/versions are as follows: WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, and WZR-D1100H firmware Ver. 2.00 and earlier. * Issue with enabling undocumented debugging features (CWE-912) - CVE-2022-39044 It was * Use hard-coded credentials (CWE-798) - CVE-2022-34840 It was * authentication bypass (CWE-288) - CVE-2022-40966 This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer. Reporter : Zero Zero One Co., Ltd. It was * A user logged into the product accesses the debug function and any OS command is executed - CVE-2022-39044 It was * The setting of the product is changed by a third party on an adjacent network - CVE-2022-34840 It was * A third party on an adjacent network circumvents authentication and accesses the product illegally - CVE-2022-40966. Buffalo firmware is a network device of Japan's Buffalo company. 2.00 and previous versions

Trust: 2.25

sources: NVD: CVE-2022-34840 // JVNDB: JVNDB-2022-002444 // CNVD: CNVD-2022-87596 // VULMON: CVE-2022-34840

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-87596

AFFECTED PRODUCTS

vendor:buffalomodel:wzr-600dhp2scope:lteversion:1.15

Trust: 1.0

vendor:buffalomodel:wzr-300hpscope:lteversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-450hpscope:lteversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-900dhpscope:lteversion:1.15

Trust: 1.0

vendor:buffalomodel:hw-450hp-zwescope:lteversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-450hp-cwtscope:lteversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-450hp-ubscope:lteversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-d1100hscope:lteversion:2.00

Trust: 1.0

vendor:buffalomodel:wzr-600dhpscope:lteversion:2.00

Trust: 1.0

vendor:バッファローmodel:whr-g54sscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-g301nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-ampgscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr2-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g302hscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wlae-ag300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-hp-ampgscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wrm-d2133hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:dwr-pgscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-g144nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:ws024bfscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wrm-d2133hsscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-1900dhp3scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-1900dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-am54g54scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-ag300hscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-900dhp2scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-900dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wli-tx4-ag300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-1750dhp2scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-1166dhp2scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-g144nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr2-g108scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wtr-m2133hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:bhr-4grvscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-1750dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-6000ax12sscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-450hp-cwtscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-g54s-niscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-s600dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:ws024bf-nwscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-gscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-600dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wer-ag54scope: - version: -

Trust: 0.8

vendor:バッファローmodel:hw-450hp-zwescope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g450hscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wem-1266scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wpl-05g300scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-1750dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wtr-m2133hsscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-ampg300nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-hp-gscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wer-a54g54scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wer-am54g54scope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-300scope: - version: -

Trust: 0.8

vendor:バッファローmodel:dwr-hp-g300nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-agl300nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-300hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-hp-gnscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-ampg144nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wer-amg54scope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-hp-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g301nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-hp-g300nscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-1900dhp2scope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-300hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-hp-g300nhscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-600dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-d1100hscope: - version: -

Trust: 0.8

vendor:バッファローmodel:fs-r600dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-450hpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wcr-300scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-s1750dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-600dhp3scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-5950ax12scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-s900dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-amg54scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wli-h4-d600scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-450hp-ubscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wem-1266wpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:whr-hp-g54scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-1166dhpscope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-1750dhp2scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wzr-600dhp2scope: - version: -

Trust: 0.8

vendor:バッファローmodel:wxr-6000ax12bscope: - version: -

Trust: 0.8

vendor:buffalomodel:wzr-300hpscope:lteversion:<=2.00

Trust: 0.6

vendor:buffalomodel:wzr-450hpscope:lteversion:<=2.00

Trust: 0.6

vendor:buffalomodel:wzr-600dhpscope:lteversion:<=2.00

Trust: 0.6

vendor:buffalomodel:wzr-900dhpscope:lteversion:<=1.15

Trust: 0.6

vendor:buffalomodel:hw-450hp-zwescope:lteversion:<=2.00

Trust: 0.6

vendor:buffalomodel:wzr-450hp-cwtscope:lteversion:<=2.00

Trust: 0.6

vendor:buffalomodel:wzr-450hp-ubscope:lteversion:<=2.00

Trust: 0.6

vendor:buffalomodel:wzr-600dhp2scope:lteversion:<=1.15

Trust: 0.6

vendor:buffalomodel:wzr-d1100hscope:lteversion:<=2.00

Trust: 0.6

sources: CNVD: CNVD-2022-87596 // JVNDB: JVNDB-2022-002444 // NVD: CVE-2022-34840

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34840
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-34840
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2022-002444
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2022-87596
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202210-122
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2022-87596
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:C/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-34840
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-002444
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-87596 // JVNDB: JVNDB-2022-002444 // CNNVD: CNNVD-202210-122 // NVD: CVE-2022-34840 // NVD: CVE-2022-34840

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.0

problemtype:Unpublished features (CWE-912) [ others ]

Trust: 0.8

problemtype: Use hard-coded credentials (CWE-798) [ others ]

Trust: 0.8

problemtype: Authentication Bypass Using Alternate Paths or Channels (CWE-288) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-002444 // NVD: CVE-2022-34840

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202210-122

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202210-122

PATCH

title:Multiple vulnerabilities in some products such as routers and countermeasuresurl:https://www.buffalo.jp/news/detail/20221003-01.html

Trust: 0.8

title:Patch for Buffalo Trust Management Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/370981

Trust: 0.6

title:Buffalo network devices Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=216693

Trust: 0.6

sources: CNVD: CNVD-2022-87596 // JVNDB: JVNDB-2022-002444 // CNNVD: CNNVD-202210-122

EXTERNAL IDS

db:NVDid:CVE-2022-34840

Trust: 3.1

db:JVNid:JVNVU92805279

Trust: 2.5

db:JVNDBid:JVNDB-2022-002444

Trust: 2.0

db:CNVDid:CNVD-2022-87596

Trust: 0.6

db:CNNVDid:CNNVD-202210-122

Trust: 0.6

db:VULMONid:CVE-2022-34840

Trust: 0.1

sources: CNVD: CNVD-2022-87596 // VULMON: CVE-2022-34840 // JVNDB: JVNDB-2022-002444 // CNNVD: CNNVD-202210-122 // NVD: CVE-2022-34840

REFERENCES

url:https://jvn.jp/en/vu/jvnvu92805279/index.html

Trust: 1.7

url:https://www.buffalo.jp/news/detail/20221003-01.html

Trust: 1.7

url:https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-002444.html

Trust: 1.2

url:http://jvn.jp/vu/jvnvu92805279/index.html

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34840/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-87596 // VULMON: CVE-2022-34840 // JVNDB: JVNDB-2022-002444 // CNNVD: CNNVD-202210-122 // NVD: CVE-2022-34840

SOURCES

db:CNVDid:CNVD-2022-87596
db:VULMONid:CVE-2022-34840
db:JVNDBid:JVNDB-2022-002444
db:CNNVDid:CNNVD-202210-122
db:NVDid:CVE-2022-34840

LAST UPDATE DATE

2025-04-25T01:39:38.148000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-87596date:2022-12-14T00:00:00
db:VULMONid:CVE-2022-34840date:2022-12-07T00:00:00
db:JVNDBid:JVNDB-2022-002444date:2022-10-12T09:04:00
db:CNNVDid:CNNVD-202210-122date:2022-12-14T00:00:00
db:NVDid:CVE-2022-34840date:2025-04-23T17:15:48.673

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-87596date:2022-12-14T00:00:00
db:VULMONid:CVE-2022-34840date:2022-12-07T00:00:00
db:JVNDBid:JVNDB-2022-002444date:2022-10-05T00:00:00
db:CNNVDid:CNNVD-202210-122date:2022-10-04T00:00:00
db:NVDid:CVE-2022-34840date:2022-12-07T10:15:10.303