| Summary | TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.) |
|---|---|
| Publication Date | Aug. 28, 2019, 3:15 a.m. |
| Registration Date | Jan. 26, 2021, 11:38 a.m. |
| Last Update | Nov. 21, 2024, 1:24 p.m. |
| CVSS3.0 : HIGH | |
| スコア | 8.8 |
|---|---|
| Vector | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | 隣接 |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 5.8 |
|---|---|
| Vector | AV:A/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | 隣接 |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:tp-link:archer_c3200_v1_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:tp-link:archer_c3200_v1:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:tp-link:archer_c2_v1_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:tp-link:archer_c2_v1:-:*:*:*:*:*:*:* | ||||
| Title | TP-Link Archer C3200 V1 および Archer C2 V1 デバイスにおける入力確認に関する脆弱性 |
|---|---|
| Summary | TP-Link Archer C3200 V1 および Archer C2 V1 デバイスには、入力確認に関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 27, 2019, midnight |
| Registration Date | Sept. 6, 2019, 3:47 p.m. |
| Last Update | Sept. 6, 2019, 3:47 p.m. |
| TP-LINK Technologies |
| Archer C2 ファームウェア |
| Archer C3200 ファームウェア |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2019年09月06日] 掲載 |
Sept. 6, 2019, 3:47 p.m. |