Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to log in with the root privilege and perform an arbitrary operation if the product is in its default settings in which is set to accept SSH connections from the WAN side, and is also connected to the Internet with the authentication information unchanged from the default settings.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN46892984/index.html | Third Party Advisory VDB Entry |
https://network.mobile.rakuten.co.jp/information/news/product/1033/ | Vendor Advisory |
https://jvn.jp/en/jp/JVN46892984/index.html | Third Party Advisory VDB Entry |
https://network.mobile.rakuten.co.jp/information/news/product/1033/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry | |
References | () https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-06-13 05:15
Updated : 2024-11-21 06:57
NVD link : CVE-2022-28704
Mitre link : CVE-2022-28704
CVE.ORG link : CVE-2022-28704
JSON object : View
Products Affected
rakuten
- casa
CWE