First published: Mon May 22 2017(Updated: )
The Toshiba FlashAir SD-WD/WC series Class 6 model with firmware version 1.00.04 and later, FlashAir SD-WD/WC series Class 10 model W-02 with firmware version 2.00.02 and later, FlashAir SD-WE series Class 10 model W-03, FlashAir Class 6 model with firmware version 1.00.04 and later, FlashAir II Class 10 model W-02 series with firmware version 2.00.02 and later, FlashAir III Class 10 model W-03 series, FlashAir Class 6 model with firmware version 1.00.04 and later, FlashAir W-02 series Class 10 model with firmware version 2.00.02 and later, FlashAir W-03 series Class 10 model does not require authentication on accepting a connection from STA side LAN when "Internet pass-thru Mode" is enabled, which allows attackers with access to STA side LAN can obtain files or data.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba FlashAir | <=1.00.03 | |
Toshiba FlashAir | <=1.00.04 | |
Toshiba FlashAir | <=1.00.06 | |
Toshiba FlashAir | <=1.02 | |
Toshiba FlashAir | <=2.00.03 | |
Toshiba FlashAir | <=3.00.01 | |
Toshiba FlashAir | <=3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4863 has been classified as a moderate severity vulnerability.
To address CVE-2016-4863, users should update their Toshiba FlashAir products to the latest firmware version.
The affected models include various FlashAir SD-WD/WC series and FlashAir II devices with specific firmware versions.
Yes, CVE-2016-4863 may allow unauthorized access to the contents of the affected FlashAir SD cards.
As of now, there are no publicly documented exploits specifically targeting CVE-2016-4863.