Vulnerability Details : CVE-2018-16201
Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands.
Products affected by CVE-2018-16201
- cpe:2.3:o:toshiba:hem-gw16a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:toshiba:hem-gw26a_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-16201
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-16201
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.3
|
HIGH | AV:A/AC:L/Au:N/C:C/I:C/A:C |
6.5
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-16201
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-16201
-
https://jvn.jp/en/jp/JVN99810718/index.html
JVN#99810718: Multiple vulnerabilities in Toshiba Lighting & Technology Corporation Home gatewayThird Party Advisory
-
http://www.tlt.co.jp/tlt/information/seihin/notice/defect/20181219/20181219.htm
東芝ホームゲートウェイの脆弱性について | 当社製品をご利用のお客様へ重要なお知らせ | お知らせ | 東芝ライテック(株)Vendor Advisory
Jump to