VAR-202205-1607
Vulnerability from variot - Updated: 2024-11-23 21:32Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to obtain the information stored in the product because the product is set to accept HTTP connections from the WAN side by default. Provided by Rakuten Mobile, Inc. Rakuten Casa There are multiple vulnerabilities in the following: - Use of hardcoded credentials (CWE-798) - CVE-2022-29525 - Inadequate access restrictions (CWE-284) - CVE-2022-28704 - Inadequate access restrictions (CWE-284) - CVE-2022-26834CVE-2022-29525 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Rack Co., Ltd. Hirai Narumi Mr CVE-2022-28704 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Oshiro Yuki Mr. Tagawa Maki Mr CVE-2022-26834 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Tagawa Maki MrThe expected impact varies depending on the vulnerability, but the following impacts may occur: - A third party who has access to information about the affected product's case may root The user can log in with the appropriate permissions and perform any operation. - CVE-2022-28704 ・Initial settings WAN From the side HTTP The device is ready to accept connections, and internal information about the device can be obtained. - CVE-2022-26834. Rakuten Mobile Rakuten Casa is a small base station of Rakuten Mobile in Japan. Used to improve radio wave conditions for users
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-1607",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "casa",
"scope": "eq",
"trust": 1.0,
"vendor": "rakuten",
"version": "ap_f_v1_4_1"
},
{
"model": "casa",
"scope": "eq",
"trust": 1.0,
"vendor": "rakuten",
"version": "ap_f_v2_0_0"
},
{
"model": "rakuten casa",
"scope": "eq",
"trust": 0.8,
"vendor": "\u697d\u5929\u30e2\u30d0\u30a4\u30eb\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "rakuten casa",
"scope": "eq",
"trust": 0.8,
"vendor": "\u697d\u5929\u30e2\u30d0\u30a4\u30eb\u682a\u5f0f\u4f1a\u793e",
"version": "ap_f_v1_4_1 or ap_f_v2_0_0"
},
{
"model": "mobile rakuten casa ap f v2 0 0",
"scope": null,
"trust": 0.6,
"vendor": "rakuten",
"version": null
},
{
"model": "mobile rakuten casa ap f v1 4 1",
"scope": null,
"trust": 0.6,
"vendor": "rakuten",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"cve": "CVE-2022-26834",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2022-26834",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 7.8,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2022-000036",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2022-77816",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2022-26834",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2022-000036",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-26834",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2022-77816",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3822",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2022-26834",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "VULMON",
"id": "CVE-2022-26834"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
},
{
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to obtain the information stored in the product because the product is set to accept HTTP connections from the WAN side by default. Provided by Rakuten Mobile, Inc. Rakuten Casa There are multiple vulnerabilities in the following: - Use of hardcoded credentials (CWE-798) - CVE-2022-29525 - Inadequate access restrictions (CWE-284) - CVE-2022-28704 - Inadequate access restrictions (CWE-284) - CVE-2022-26834CVE-2022-29525 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Rack Co., Ltd. Hirai Narumi Mr CVE-2022-28704 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Oshiro Yuki Mr. Tagawa Maki Mr CVE-2022-26834 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Tagawa Maki MrThe expected impact varies depending on the vulnerability, but the following impacts may occur: - A third party who has access to information about the affected product\u0027s case may root The user can log in with the appropriate permissions and perform any operation. - CVE-2022-28704 \u30fbInitial settings WAN From the side HTTP The device is ready to accept connections, and internal information about the device can be obtained. - CVE-2022-26834. Rakuten Mobile Rakuten Casa is a small base station of Rakuten Mobile in Japan. Used to improve radio wave conditions for users",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-26834"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "VULMON",
"id": "CVE-2022-26834"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-26834",
"trust": 3.9
},
{
"db": "JVN",
"id": "JVN46892984",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036",
"trust": 1.4
},
{
"db": "CS-HELP",
"id": "SB2022051910",
"trust": 1.2
},
{
"db": "CNVD",
"id": "CNVD-2022-77816",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3822",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-26834",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "VULMON",
"id": "CVE-2022-26834"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
},
{
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"id": "VAR-202205-1607",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
}
],
"trust": 1.35
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
}
]
},
"last_update_date": "2024-11-23T21:32:26.627000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u3010important\u3011 Rakuten\u00a0Casa Software update information",
"trust": 0.8,
"url": "https://network.mobile.rakuten.co.jp/information/news/product/1033/"
},
{
"title": "Patch for Rakuten Mobile Rakuten Casa Access Control Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/349121"
},
{
"title": "Rakuten Mobile Rakuten Casa Fixes for access control error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=196947"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "others (CWE-Other) [IPA evaluation ]",
"trust": 0.8
},
{
"problemtype": " Authorization / authority / access control (CWE-264) [IPA evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://jvn.jp/en/jp/jvn46892984/index.html"
},
{
"trust": 1.7,
"url": "https://network.mobile.rakuten.co.jp/information/news/product/1033/"
},
{
"trust": 1.2,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022051910"
},
{
"trust": 0.8,
"url": "https://jvn.jp/jp/jvn46892984/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-26834"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-28704"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-29525"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-26834/"
},
{
"trust": 0.6,
"url": "https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-000036.html"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/863.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "VULMON",
"id": "CVE-2022-26834"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
},
{
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "VULMON",
"id": "CVE-2022-26834"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
},
{
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-09-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"date": "2022-06-13T00:00:00",
"db": "VULMON",
"id": "CVE-2022-26834"
},
{
"date": "2022-05-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"date": "2022-05-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3822"
},
{
"date": "2022-06-13T05:15:11.143000",
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"date": "2022-06-21T00:00:00",
"db": "VULMON",
"id": "CVE-2022-26834"
},
{
"date": "2024-06-18T03:07:00",
"db": "JVNDB",
"id": "JVNDB-2022-000036"
},
{
"date": "2022-06-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3822"
},
{
"date": "2024-11-21T06:54:36.587000",
"db": "NVD",
"id": "CVE-2022-26834"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rakuten Mobile Rakuten Casa Access Control Error Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77816"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access control error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3822"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.