CVE-2022-26834

Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to obtain the information stored in the product because the product is set to accept HTTP connections from the WAN side by default.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rakuten:casa:ap_f_v1_4_1:*:*:*:*:*:*:*
cpe:2.3:a:rakuten:casa:ap_f_v2_0_0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:54

Type Values Removed Values Added
References () https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry () https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry
References () https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory () https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-863 NVD-CWE-Other

21 Jun 2022, 18:01

Type Values Removed Values Added
CWE CWE-863
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (MISC) https://network.mobile.rakuten.co.jp/information/news/product/1033/ - (MISC) https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory
References (MISC) https://jvn.jp/en/jp/JVN46892984/index.html - (MISC) https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:rakuten:casa:ap_f_v1_4_1:*:*:*:*:*:*:*
cpe:2.3:a:rakuten:casa:ap_f_v2_0_0:*:*:*:*:*:*:*

13 Jun 2022, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-13 05:15

Updated : 2024-11-21 06:54


NVD link : CVE-2022-26834

Mitre link : CVE-2022-26834

CVE.ORG link : CVE-2022-26834


JSON object : View

Products Affected

rakuten

  • casa