ELECOM routers security bypass | CVE-2022-25915
NAME
ELECOM routers security bypass
- Platforms Affected:
ELECOM WRC-2533GST2 1.13
ELECOM WRC-1900GST2 1.13
ELECOM WRC-1750GST2 1.13
ELECOM LAN WRC-1167GST2A 1.25
ELECOM LAN WRC-1167GST2H 1.25
ELECOM LAN WRC-2533GS2-B 1.52
ELECOM LAN WRC-2533GS2-W 1.52
ELECOM LAN WRC-1750GS 1.03
ELECOM LAN WRC-1750GSV 2.11
ELECOM LAN WRC-1900GST 1.03
ELECOM LAN WRC-2533GST 1.03
ELECOM LAN WRC-2533GSTA 1.03
ELECOM LAN WRC-1167GST2 1.25
ELECOM LAN WRC-2533GST2SP 1.25
ELECOM LAN WRC-2533GST2-G 1.25
ELECOM EDWRC-2533GST2 1.25
ELECOM WRC-1167GS2-B 1.65
ELECOM WRC-1167GS2H-B 1.65
ELECOM WMC-DLGST2-W 1.24
ELECOM WMC-M1267GST2-W 1.24
ELECOM WMC-2HC-W 1.24
ELECOM WMC-C2533GST-W 1.24
ELECOM WRC-1900GST2SP 1.15 - Risk Level:
8.8 - Exploitability:
Unproven - Consequences:
Bypass Security
DESCRIPTION
ELECOM routers could allow a remote attacker to bypass security restrictions, caused by improper access control in the management screen. An attacker could exploit this vulnerability to bypass access restrictions.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Access Vector: Adjacent Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Apply the appropriate update for your system. See References.
- Reference Link:
https://jvn.jp/en/jp/JVN88993473/ - Reference Link:
https://elecomus.com/web/
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.