First published: Wed Jan 09 2019(Updated: )
Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an attacker on the same network segment to bypass access restriction to access the information and files stored on the affected device.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Toshiba Hem-gw16a | <=1.2.9 | |
Toshiba Hem-gw16a Firmware | ||
Toshiba Hem-gw26a | <=1.2.9 | |
Toshiba Hem-gw26a Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16197 has a severity rating that indicates a medium risk due to the potential for unauthorized access to sensitive information on the device.
To fix CVE-2018-16197, you should upgrade the firmware of your Toshiba Home gateway models HEM-GW16A and HEM-GW26A to version 1.2.10 or later.
CVE-2018-16197 affects Toshiba Home gateway models HEM-GW16A and HEM-GW26A with firmware versions 1.2.9 and earlier.
Mitigating the effects of CVE-2018-16197 without updating is challenging; restricting network access and monitoring device activity is advisable.
Yes, CVE-2018-16197 can be easily exploited by attackers on the same network segment, posing a security risk.