Multiple vulnerabilities in FUJI SOFT network devices



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2022-43442
CVE-2022-43470
CWE-ID CWE-256
CWE-352
Exploitation vector Local
Public exploit N/A
Vulnerable software
+F FS040U
Hardware solutions / Routers & switches, VoIP, GSM, etc

+F FS020W
Hardware solutions / Routers & switches, VoIP, GSM, etc

+F FS030W
Hardware solutions / Routers & switches, VoIP, GSM, etc

+F FS040W
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor FUJISOFT INCORPORATED

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Unprotected storage of credentials

EUVDB-ID: #VU68869

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-43442

CWE-ID: CWE-256 - Unprotected Storage of Credentials

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to other users' credentials.

The vulnerability exists due to application stored credentials in plain text in a configuration file on the system. An attacker with physical access can obtain the login password and log in to the management console.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

+F FS040U: 2.3.4

CPE2.3 External links

https://jvn.jp/en/jp/JVN74285622/index.html


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Cross-site request forgery

EUVDB-ID: #VU68870

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-43470

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

+F FS040U: 2.3.4

+F FS020W: 4.0.0

+F FS030W: 3.3.5

+F FS040W: 1.4.1

CPE2.3 External links

https://jvn.jp/en/jp/JVN74285622/index.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###