fkie_cve-2024-23910
Vulnerability from fkie_nvd
Published
2024-02-28 23:15
Modified
2025-04-22 16:15
Summary
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-1167gs2-b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "562FC1F4-4B24-427E-981F-FABA8C270E24",
                     versionEndExcluding: "1.73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C37403-F848-4FD4-9AC3-FED5BF871163",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-1167gs2h-b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4044F887-CB21-49E5-A6F5-E8D6FF13E757",
                     versionEndExcluding: "1.73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9E9EB42-AFE2-44DB-83A3-A9E74BB9A010",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "185BD8AF-8C0C-4528-9CF3-6C6FC7869C0E",
                     versionEndExcluding: "1.34",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9045F74-985E-4C3C-AC10-14FD9B61A746",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAE30FA6-A244-4781-9397-7A56E74B7FF8",
                     versionEndExcluding: "1.68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9FF3CB7-7F2E-472A-A2A3-ED599F4FC99C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A6660BB-9A29-4C6E-8E6C-9AAD663669A7",
                     versionEndExcluding: "1.68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECD9F0FE-1232-4C39-AA86-2D616E4D39C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-2533gs2v-b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EAD43E5-BC22-4008-BA9B-97DD6F3344D4",
                     versionEndExcluding: "1.68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-2533gs2v-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69FF2911-A946-4E48-B50A-F1F5EC95BBCC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42CBC3B-C096-4622-8072-3CE279FBA4A0",
                     versionEndExcluding: "1.31",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BF0A23-43C9-4497-BDDF-9366642503ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-x3200gst3-b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82307DBF-148B-4D72-8BB2-1574068A3E4E",
                     versionEndExcluding: "1.27",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-x3200gst3-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DF4AD14-A9E3-4797-A201-BBE34BBCEDD3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wrc-g01-w_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "09D59756-26E6-4FFE-8C4C-09904BE42A7E",
                     versionEndExcluding: "1.26",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wrc-g01-w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FFAFF4E-7884-455C-AE6D-B5600C0EEA73",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wmc-x1800gst-b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "864689A8-CA48-466F-B675-47F777F948AC",
                     versionEndExcluding: "1.42",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wmc-x1800gst-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40476229-3AC2-4A0F-BCC4-A170879441F9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:elecom:wsc-x1800gs-b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C6859E-9EE5-45C9-BE42-22D0F6DED34C",
                     versionEndExcluding: "1.42",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:elecom:wsc-x1800gs-b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F150E210-8EDC-4183-BF72-F115A82F8E5A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit \"WMC-2LX-B\".",
      },
      {
         lang: "es",
         value: "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en los enrutadores LAN inalámbricos ELECOM permite a un atacante remoto no autenticado secuestrar la autenticación de los administradores y realizar operaciones no deseadas en el producto afectado. Los productos y versiones afectados son los siguientes: WRC-1167GS2-B v1.67 y anteriores, WRC-1167GS2H-B v1.67 y anteriores, WRC-2533GS2-B v1.62 y anteriores, WRC-2533GS2-W v1.62 y anteriores y WRC-2533GS2V-B v1.62 y anteriores.",
      },
   ],
   id: "CVE-2024-23910",
   lastModified: "2025-04-22T16:15:43.070",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "vultures@jpcert.or.jp",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-28T23:15:09.557",
   references: [
      {
         source: "vultures@jpcert.or.jp",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jvn.jp/en/jp/JVN44166658/",
      },
      {
         source: "vultures@jpcert.or.jp",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.elecom.co.jp/news/security/20240220-01/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jvn.jp/en/jp/JVN44166658/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.elecom.co.jp/news/security/20240220-01/",
      },
   ],
   sourceIdentifier: "vultures@jpcert.or.jp",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-352",
            },
         ],
         source: "vultures@jpcert.or.jp",
         type: "Secondary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.