Improper access control vulnerability in Buffalo network devices allows a network-adjacent attacker to obtain specific files of the product. As a result, the product settings may be altered. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier
References
Link Resource
https://jvn.jp/en/vu/JVNVU96824262/ Third Party Advisory
https://www.buffalo.jp/news/detail/20230310-01.html Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: jpcert

Published: 2023-04-11T00:00:00

Updated: 2023-04-11T00:00:00

Reserved: 2023-02-26T00:00:00


Link: CVE-2023-24544

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-04-11T09:15:07.850

Modified: 2023-04-18T19:36:20.460


Link: CVE-2023-24544

JSON object: View

cve-icon Redhat Information

No data.