First published: Tue Apr 11 2023(Updated: )
Improper access control vulnerability in Buffalo network devices allows a network-adjacent attacker to obtain specific files of the product. As a result, the product settings may be altered. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Buffalo Bs-gsl2024 | <=1.10-0.03 | |
Buffalo Bs-gsl2024 Firmware | ||
Buffalo Bs-gsl2016p Firmware | <=1.10-0.03 | |
Buffalo BS-GSL2016P | ||
Buffalo Bs-gsl2016 Firmware | <=1.10-0.03 | |
Buffalo BS-GSL2016 | ||
Buffalo BS-GS2008P | <=1.0.10.01 | |
Buffalo Bs-gs2008 Firmware | ||
Buffalo BS-GS2016P | <=1.0.10.01 | |
Buffalo BS-GS2016 | ||
Buffalo Bs-gs2024 | <=1.0.10.01 | |
Buffalo Bs-gs2024 | ||
Buffalo Bs-gs2048 Firmware | <=1.0.10.01 | |
Buffalo BS-GS2048 | ||
Buffalo BS-GS2008P | <=1.0.10.01 | |
Buffalo BS-GS2008P | ||
Buffalo BS-GS2016P | <=1.0.10.01 | |
Buffalo Bs-gs2016p Firmware | ||
Buffalo Bs-gs2024 | <=1.0.10.01 | |
Buffalo Bs-gs2024p Firmware | ||
Buffalo BS-GS2016P | <1.1.7.01 | |
Buffalo BS-GS2016HP | <1.1.7.01 | |
Buffalo BS-GS2016HP | ||
Buffalo Bs-gs2024 | <1.1.7.01 | |
Buffalo BS-GS2024HP | <1.1.7.01 | |
Buffalo BS-GS2024HP | ||
All of | ||
Buffalo Bs-gsl2024 | <=1.10-0.03 | |
Buffalo Bs-gsl2024 Firmware | ||
All of | ||
Buffalo Bs-gsl2016p Firmware | <=1.10-0.03 | |
Buffalo BS-GSL2016P | ||
All of | ||
Buffalo Bs-gsl2016 Firmware | <=1.10-0.03 | |
Buffalo BS-GSL2016 | ||
All of | ||
Buffalo BS-GS2008P | <=1.0.10.01 | |
Buffalo Bs-gs2008 Firmware | ||
All of | ||
Buffalo BS-GS2016P | <=1.0.10.01 | |
Buffalo BS-GS2016 | ||
All of | ||
Buffalo Bs-gs2024 | <=1.0.10.01 | |
Buffalo Bs-gs2024 | ||
All of | ||
Buffalo Bs-gs2048 Firmware | <=1.0.10.01 | |
Buffalo BS-GS2048 | ||
All of | ||
Buffalo BS-GS2008P | <=1.0.10.01 | |
Buffalo BS-GS2008P | ||
All of | ||
Buffalo BS-GS2016P | <=1.0.10.01 | |
Buffalo Bs-gs2016p Firmware | ||
All of | ||
Buffalo Bs-gs2024 | <=1.0.10.01 | |
Buffalo Bs-gs2024p Firmware | ||
All of | ||
Buffalo BS-GS2016P | <1.1.7.01 | |
Buffalo Bs-gs2016p Firmware | ||
All of | ||
Buffalo BS-GS2016HP | <1.1.7.01 | |
Buffalo BS-GS2016HP | ||
All of | ||
Buffalo Bs-gs2024 | <1.1.7.01 | |
Buffalo Bs-gs2024p Firmware | ||
All of | ||
Buffalo BS-GS2024HP | <1.1.7.01 | |
Buffalo BS-GS2024HP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24544 is an improper access control vulnerability in Buffalo network devices that allows a network-adjacent attacker to obtain specific files of the product and alter the product settings.
The affected Buffalo network devices are BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03, BS-GS2008 firmware Ver. 1.0.10.01, BS-GS2016 firmware Ver. 1.0.10.01, BS-GS2024 firmware Ver. 1.0.10.01, BS-GS2048 firmware Ver. 1.0.10.01, BS-GS2008P firmware Ver. 1.0.10.01, BS-GS2016P firmware Ver. 1.0.10.01, BS-GS2024P firmware Ver. 1.0.10.01, BS-GS2016HP firmware up to exclusive 1.1.7.01, and BS-GS2024HP firmware up to exclusive 1.1.7.01.
CVE-2023-24544 has a severity rating of 8.1 (high).
To fix CVE-2023-24544, update the firmware of the affected Buffalo network devices to a version that is not vulnerable.
You can find more information about CVE-2023-24544 on the [JVN website](https://jvn.jp/en/vu/JVNVU96824262/) and the [Buffalo website](https://www.buffalo.jp/news/detail/20230310-01.html).