NVD Vulnerability Detail
Search Exploit, PoC
CVE-2019-19822
Summary

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote attackers to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.

Publication Date Jan. 28, 2020, 3:15 a.m.
Registration Date Jan. 26, 2021, 11:41 a.m.
Last Update Nov. 21, 2024, 1:35 p.m.
CVSS3.1 : HIGH
スコア 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I) なし
可用性への影響(A) なし
CVSS2.0 : MEDIUM
Score 5.0
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I) なし
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:* 2.0.0
execution environment
1 cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:* 2.1.3
execution environment
1 cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:* 3.4.0
execution environment
1 cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:* 3.4.0
execution environment
1 cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:* 4.0.0
execution environment
1 cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:* 3.4.0
execution environment
1 cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*
Configuration7 or higher or less more than less than
cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:* 3.4.0
execution environment
1 cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*
Configuration8 or higher or less more than less than
cpe:2.3:o:realtek:rtk_11n_ap_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:realtek:rtk_11n_ap:-:*:*:*:*:*:*:*
Configuration9 or higher or less more than less than
cpe:2.3:o:sapido:gr297n_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:sapido:gr297n:-:*:*:*:*:*:*:*
Configuration10 or higher or less more than less than
cpe:2.3:o:ciktel:mesh_router_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:ciktel:mesh_router:-:*:*:*:*:*:*:*
Configuration11 or higher or less more than less than
cpe:2.3:o:kctvjeju:wireless_ap_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:kctvjeju:wireless_ap:-:*:*:*:*:*:*:*
Configuration12 or higher or less more than less than
cpe:2.3:o:fg-products:fgn-r2_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:fg-products:fgn-r2:-:*:*:*:*:*:*:*
Configuration13 or higher or less more than less than
cpe:2.3:o:hiwifi:max-c300n_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:hiwifi:max-c300n:-:*:*:*:*:*:*:*
Configuration14 or higher or less more than less than
cpe:2.3:o:tbroad:gn-866ac_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:tbroad:gn-866ac:-:*:*:*:*:*:*:*
Configuration15 or higher or less more than less than
cpe:2.3:o:coship:emta_ap_firmwre:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:coship:emta_ap:-:*:*:*:*:*:*:*
Configuration16 or higher or less more than less than
cpe:2.3:o:iodata:wn-ac1167r_firmwre:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:iodata:wn-ac1167r:-:*:*:*:*:*:*:*
Configuration17 or higher or less more than less than
cpe:2.3:o:hcn_max-c300n_project:hcn_max-c300n_firmware:*:*:*:*:*:*:*:* 2019-12-12
execution environment
1 cpe:2.3:h:hcn_max-c300n_project:hcn_max-c300n:-:*:*:*:*:*:*:*
Configuration18 or higher or less more than less than
cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:* 2.1.6
execution environment
1 cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
複数の製品における認証情報の不十分な保護に関する脆弱性
Title 複数の製品における認証情報の不十分な保護に関する脆弱性
Summary

複数の製品には、認証情報の不十分な保護に関する脆弱性が存在します。

Possible impacts 情報を取得される可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date Dec. 16, 2019, midnight
Registration Date Feb. 20, 2020, 6:09 p.m.
Last Update Feb. 20, 2020, 6:09 p.m.
Affected System
Sapido
GR297n ファームウェア 2019/12/12 まで
KCTVJEJU
Wireless AP ファームウェア 2019/12/12 まで
CIK Telecom
MESH Router ファームウェア 2019/12/12 まで
TOTOLINK
A3002RU ファームウェア 2.0.0 まで
A702R ファームウェア 2.1.3 まで
N100RE ファームウェア 3.4.0 まで
N150RT ファームウェア 3.4.0 まで
N200RE ファームウェア 4.0.0 まで
N300RT ファームウェア 3.4.0 まで
N302R ファームウェア 3.4.0 まで
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
1 [2020年02月20日]
  掲載
Feb. 20, 2020, 6:09 p.m.