Active Debug Code in Yamaha wireless LAN access point devices



Published: 2024-01-23
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-22366
CWE-ID CWE-489
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
WLX222
Hardware solutions / Routers & switches, VoIP, GSM, etc

WLX413
Hardware solutions / Routers & switches, VoIP, GSM, etc

WLX212
Hardware solutions / Routers & switches, VoIP, GSM, etc

WLX313
Hardware solutions / Routers & switches, VoIP, GSM, etc

WLX202
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Yamaha Corporation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Active Debug Code

EUVDB-ID: #VU85693

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-22366

CWE-ID: CWE-489 - Active Debug Code

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to the active debug code issue. A remote administrator on the local network can access debug features that were accidentally exposed.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

WLX222: 24.00.03

WLX413: 22.00.05

WLX212: 21.00.12

WLX313: 18.00.12

WLX202: 16.00.18

External links

http://jvn.jp/en/vu/JVNVU99896362/index.html
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###