#VU85693 Active Debug Code in Yamaha Corporation Hardware solutions


Published: 2024-01-23

Vulnerability identifier: #VU85693

Vulnerability risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-22366

CWE-ID: CWE-489

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
WLX222
Hardware solutions / Routers & switches, VoIP, GSM, etc
WLX413
Hardware solutions / Routers & switches, VoIP, GSM, etc
WLX212
Hardware solutions / Routers & switches, VoIP, GSM, etc
WLX313
Hardware solutions / Routers & switches, VoIP, GSM, etc
WLX202
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Yamaha Corporation

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to the active debug code issue. A remote administrator on the local network can access debug features that were accidentally exposed.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

WLX222: 24.00.03

WLX413: 22.00.05

WLX212: 21.00.12

WLX313: 18.00.12

WLX202: 16.00.18


External links
http://jvn.jp/en/vu/JVNVU99896362/index.html
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability