Vulnerabilites related to yamaha - fwx120
Vulnerability from fkie_nvd
Published
2014-01-23 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
The OSPF implementation on Yamaha routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:fwx120:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DBE3E44-1A97-4B6D-912C-609D8B45D105", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt105:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FB4757E-B1D3-4B09-8545-2278263991C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt107e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7824CDA3-7993-4EBF-9091-633009232300", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt140:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C928105-7205-48E0-923B-4BABE8526D9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "87CF6460-AF46-4EC7-AAE2-4A926ED199AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rt300i:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B7F2620-BCED-4450-A928-1EA29E20609F", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D16744D-5082-44C2-8A49-CDAB851EE88B", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "9660F70D-A62D-44AC-9869-6A805E2714E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BF07005-4053-4419-B9A7-F2591FF1F8F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8C15B-5030-4AA8-8FF6-4EE23D4AF8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EE0143C-2421-4BCF-A196-A04C04EFD757", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A5187A4-5B0D-4ED8-B582-2A13CB3922BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:rtx810:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B7EF2A-748F-4EDE-82DD-B6D135097147", "vulnerable": true }, { "criteria": "cpe:2.3:h:yamaha:srt100:-:*:*:*:*:*:*:*", "matchCriteriaId": "05CB1586-8031-46C7-89C7-C2F6B7818DF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OSPF implementation on Yamaha routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149." }, { "lang": "es", "value": "La implementaci\u00f3n OSPF en routers Yamaha no considera la posibilidad de valores duplicados en paquetes Link State Advertisement (LSA) antes de realizar operaciones en la base de datos de LSA, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (interrupci\u00f3n de enrutamiento) u obtener informaci\u00f3n sensible de paquetes a trav\u00e9s de un paquete LSA, una vulnerabilidad relacionada con CVE-2013-0149." } ], "id": "CVE-2013-7310", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-23T17:55:05.277", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/229804" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ" }, { "source": "cve@mitre.org", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU96465452.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/229804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU96465452.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-01 12:15
Modified
2024-11-21 05:34
Severity ?
Summary
Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html | Mitigation, Vendor Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN38732359/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN38732359/index.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yamaha | rtx830_firmware | * | |
yamaha | rtx830 | - | |
yamaha | nvr510_firmware | * | |
yamaha | nvr510 | - | |
yamaha | nvr700w_firmware | * | |
yamaha | nvr700w | - | |
yamaha | rtx1210_firmware | * | |
yamaha | rtx1210 | - | |
yamaha | rtx5000_firmware | * | |
yamaha | rtx5000 | - | |
yamaha | rtx3500_firmware | * | |
yamaha | rtx3500 | - | |
yamaha | fwx120_firmware | * | |
yamaha | fwx120 | - | |
yamaha | rtx810_firmware | * | |
yamaha | rtx810 | - | |
yamaha | nvr500_firmware | * | |
yamaha | nvr500 | - | |
yamaha | rtx1200_firmware | * | |
yamaha | rtx1200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:rtx830_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B414D4B-8464-42CB-BE14-8ABFA26F1FDA", "versionEndIncluding": "15.02.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:rtx830:-:*:*:*:*:*:*:*", "matchCriteriaId": "C585EA2A-C2E0-406E-A785-668C2D8C5D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:nvr510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71966C3D-18F4-4101-8DCC-87208BBCF61B", "versionEndIncluding": "15.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:nvr510:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F29115C-CBD1-4648-A7BB-616DB70231FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:nvr700w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87C14E67-7BE0-4BF5-8B0D-02305F5B831C", "versionEndIncluding": "15.00.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:nvr700w:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF384051-AFEF-4CCD-BC7A-866EC2B87FFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:rtx1210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E11D8E2-E409-4D72-BEB0-49943D8EB1D5", "versionEndIncluding": "14.01.33", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:rtx1210:-:*:*:*:*:*:*:*", "matchCriteriaId": "38ABD757-E916-4DD3-B491-E37EEDEB601C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:rtx5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E337794-45D4-44B1-9B3B-363ED322CC6C", "versionEndIncluding": "14.00.26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:rtx5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "14F68786-EBBA-4AB9-9E86-7806713B9117", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:rtx3500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63F26DDF-CDA6-48C3-B755-947940CF5D77", "versionEndIncluding": "14.00.26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:rtx3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DE1FDA5-0F68-4104-9304-319E5F427E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:fwx120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E044DF7B-4118-4D02-9435-763A248DAC12", "versionEndIncluding": "11.03.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:fwx120:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DBE3E44-1A97-4B6D-912C-609D8B45D105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:rtx810_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BBB1629-0E21-498B-BD5B-E03E711AC42A", "versionEndIncluding": "11.01.33", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:rtx810:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B7EF2A-748F-4EDE-82DD-B6D135097147", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:nvr500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D03C1-7B13-42FE-B48B-FD12367D521B", "versionEndIncluding": "11.00.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:nvr500:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A2BF515-DCF0-4EBB-AB33-2BEB8B926453", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yamaha:rtx1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0BE58B3-5B65-4A37-8E8C-53ACF39941FD", "versionEndIncluding": "10.01.76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yamaha:rtx1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BF07005-4053-4419-B9A7-F2591FF1F8F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors." }, { "lang": "es", "value": "El Enrutador Yamaha LTE VoIP (NVR700W versiones de firmware Rev.15.00.15 y anteriores), el Enrutador Yamaha Gigabit VoIP (NVR510 versiones de firmware Rev.15.01.14 y anteriores), el Enrutador Yamaha Gigabit VPN (RTX810 versiones de firmware Rev.11.01.33 y anteriores, RTX830 versiones de firmware Rev .15.02.09 y anteriores, RTX1200 versiones de firmware Rev.10.01.76 y anteriores, RTX1210 versiones de firmware Rev.14.01.33 y anteriores, RTX3500 firmware Rev.14.00.26 y anteriores, y RTX5000 firmware Rev.14.00.26 y anteriores), el Enrutador Yamaha Broadband VoIP (NVR500 versiones de firmware Rev.11.00.38 y anteriores) y Yamaha Firewall (FWX120 versiones de firmware Rev.11.03.27 y anteriores), permiten a atacantes remotos causar una denegaci\u00f3n de servicio por medio de vectores no especificados." } ], "id": "CVE-2020-5548", "lastModified": "2024-11-21T05:34:15.293", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T12:15:15.210", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN38732359/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN38732359/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-5548 (GCVE-0-2020-5548)
Vulnerability from cvelistv5
Published
2020-04-01 11:15
Modified
2024-08-04 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service (DoS)
Summary
Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yamaha Corporation | Yamaha network devices |
Version: Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN38732359/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yamaha network devices", "vendor": "Yamaha Corporation", "versions": [ { "status": "affected", "version": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier)" } ] } ], "descriptions": [ { "lang": "en", "value": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service (DoS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T11:15:15", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN38732359/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5548", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yamaha network devices", "version": { "version_data": [ { "version_value": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier)" } ] } } ] }, "vendor_name": "Yamaha Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service (DoS)" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html", "refsource": "MISC", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN38732359.html" }, { "name": "https://jvn.jp/en/jp/JVN38732359/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN38732359/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5548", "datePublished": "2020-04-01T11:15:15", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:30:24.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-7310 (GCVE-0-2013-7310)
Vulnerability from cvelistv5
Published
2014-01-23 17:00
Modified
2024-09-16 20:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The OSPF implementation on Yamaha routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:01:20.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU96465452.html" }, { "name": "VU#229804", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/229804" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The OSPF implementation on Yamaha routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-23T17:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU96465452.html" }, { "name": "VU#229804", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/229804" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OSPF implementation on Yamaha routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU96465452.html", "refsource": "CONFIRM", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU96465452.html" }, { "name": "VU#229804", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/229804" }, { "name": "http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/CKIG-9AAHPZ" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7310", "datePublished": "2014-01-23T17:00:00Z", "dateReserved": "2014-01-23T00:00:00Z", "dateUpdated": "2024-09-16T20:47:17.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }