Use of hard-coded credentials vulnerability in Buffalo network devices allows an attacker to access the debug function of the product. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU96824262/ | Patch Third Party Advisory |
https://www.buffalo.jp/news/detail/20230310-01.html | Vendor Advisory |
https://jvn.jp/en/vu/JVNVU96824262/ | Patch Third Party Advisory |
https://www.buffalo.jp/news/detail/20230310-01.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
History
21 Nov 2024, 07:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/vu/JVNVU96824262/ - Patch, Third Party Advisory | |
References | () https://www.buffalo.jp/news/detail/20230310-01.html - Vendor Advisory |
18 Apr 2023, 19:37
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.buffalo.jp/news/detail/20230310-01.html - Vendor Advisory | |
References | (MISC) https://jvn.jp/en/vu/JVNVU96824262/ - Patch, Third Party Advisory | |
First Time |
Buffalo bs-gs2024
Buffalo bs-gs2008p Buffalo bs-gsl2016 Firmware Buffalo bs-gsl2008p Buffalo bs-gs2024p Buffalo bs-gs2024 Firmware Buffalo bs-gsl2008 Buffalo bs-gsl2016p Firmware Buffalo bs-gsl2005 Buffalo bs-gs2048 Buffalo bs-gs2024p Firmware Buffalo Buffalo bs-gsl2016p Buffalo bs-gsl2024 Firmware Buffalo bs-gs2048 Firmware Buffalo bs-gsl2024 Buffalo bs-gsl2016 Buffalo bs-gs2016hp Firmware Buffalo bs-gs2008 Buffalo bs-gs2024hp Buffalo bs-gs2016 Firmware Buffalo bs-gs2016p Buffalo bs-gsl2005p Firmware Buffalo bs-gsl2008p Firmware Buffalo bs-gs2016 Buffalo bs-gsl2008 Firmware Buffalo bs-gs2024hp Firmware Buffalo bs-gs2016p Firmware Buffalo bs-gsl2005 Firmware Buffalo bs-gs2008 Firmware Buffalo bs-gsl2005p Buffalo bs-gs2016hp Buffalo bs-gs2008p Firmware |
|
CWE | CWE-668 | |
CPE | cpe:2.3:o:buffalo:bs-gs2024hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gsl2016:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gsl2024_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gsl2005_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2016:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2016p_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gsl2016_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2024:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2008p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2024p:-:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gsl2008:-:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2008:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2008_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gsl2016p:-:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2048:-:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gsl2005p:-:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2016hp:-:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2024hp:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gsl2016p_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2016hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2016p:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2024_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gsl2005:-:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gsl2024:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gsl2005p_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gsl2008_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gsl2008p:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2024p_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gsl2008p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:buffalo:bs-gs2008p:-:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2016_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:buffalo:bs-gs2048_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
11 Apr 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-11 09:15
Updated : 2025-02-11 21:15
NVD link : CVE-2023-26588
Mitre link : CVE-2023-26588
CVE.ORG link : CVE-2023-26588
JSON object : View
Products Affected
buffalo
- bs-gs2024_firmware
- bs-gsl2024_firmware
- bs-gsl2005_firmware
- bs-gsl2008
- bs-gsl2005p_firmware
- bs-gs2016
- bs-gs2024hp
- bs-gsl2005p
- bs-gs2008
- bs-gsl2016_firmware
- bs-gsl2008p
- bs-gs2016hp_firmware
- bs-gsl2016p
- bs-gs2024
- bs-gs2024p
- bs-gsl2008p_firmware
- bs-gs2048
- bs-gs2016p
- bs-gsl2024
- bs-gs2008_firmware
- bs-gs2016_firmware
- bs-gs2024hp_firmware
- bs-gs2016p_firmware
- bs-gs2008p_firmware
- bs-gs2016hp
- bs-gs2048_firmware
- bs-gsl2005
- bs-gs2008p
- bs-gsl2008_firmware
- bs-gsl2016p_firmware
- bs-gs2024p_firmware
- bs-gsl2016
CWE
CWE-668
Exposure of Resource to Wrong Sphere