First published: Fri Jul 07 2017(Updated: )
Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier may allow remote attackers to access a non-documented developer screen to perform operations on device with administrative privileges.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba Hem-gw16a | <=1.2.0 | |
Toshiba Hem-gw16a Firmware | ||
Toshiba Hem-gw26a | <=1.2.0 | |
Toshiba Hem-gw26a Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2234 is rated as a high severity vulnerability due to the potential for unauthorized access to administrative functions.
To fix CVE-2017-2234, update the firmware of Toshiba Home gateways HEM-GW16A and HEM-GW26A to version 1.2.1 or later.
CVE-2017-2234 affects users of Toshiba Home gateway models HEM-GW16A and HEM-GW26A running firmware version 1.2.0 or earlier.
CVE-2017-2234 can enable remote attackers to gain unauthorized access and perform operations on the device with administrative privileges.
A practical workaround for CVE-2017-2234 includes disabling remote management features until the firmware update can be applied.