Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-43442 CVE-2022-43470 |
CWE-ID | CWE-256 CWE-352 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
+F FS040U Hardware solutions / Routers & switches, VoIP, GSM, etc +F FS020W Hardware solutions / Routers & switches, VoIP, GSM, etc +F FS030W Hardware solutions / Routers & switches, VoIP, GSM, etc +F FS040W Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | FUJISOFT INCORPORATED |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU68869
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-43442
CWE-ID:
CWE-256 - Unprotected Storage of Credentials
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain access to other users' credentials.
The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. An attacker with physical access can obtain the login password and log in to the management console.
MitigationInstall updates from vendor's website.
Vulnerable software versions+F FS040U: 2.3.4
CPE2.3https://jvn.jp/en/jp/JVN74285622/index.html
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68870
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-43470
CWE-ID:
CWE-352 - Cross-Site Request Forgery (CSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
MitigationInstall updates from vendor's website.
Vulnerable software versions+F FS040U: 2.3.4
+F FS020W: 4.0.0
+F FS030W: 3.3.5
+F FS040W: 1.4.1
CPE2.3https://jvn.jp/en/jp/JVN74285622/index.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.