Vulnerability Details : CVE-2019-13269
Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with an ACK or NAK message. Studying the NAK case revealed that the router erroneously sends the NAK to both Host and Guest networks with the same Transaction ID as found in the DHCP Request. This allows encoding of data to be sent cross-router into the 32-bit Transaction ID field.
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2019-13269
Probability of exploitation activity in the next 30 days: 0.10%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 40 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-13269
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.8
|
MEDIUM | AV:A/AC:L/Au:N/C:P/I:P/A:P |
6.5
|
6.4
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2019-13269
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-13269
-
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf
Third Party Advisory
-
https://orenlab.sise.bgu.ac.il/publications/CrossRouter
Cross-Router Covert Channels | Oren Lab - Implementation Security and Side-Channel AttacksExploit;Third Party Advisory
Products affected by CVE-2019-13269
- cpe:2.3:o:edimax:br-6208ac_v1_firmware:-:*:*:*:*:*:*:*