First published: Tue Dec 26 2023(Updated: )
VR-S1000 firmware Ver. 2.37 and earlier uses a hard-coded cryptographic key which may allow an attacker to analyze the password of a specific product user.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Buffalo Vr-s1000 | <=2.37 | |
Buffalo Vr-s1000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46711 has been classified with a medium severity level due to the potential exposure of user passwords.
To fix CVE-2023-46711, update the firmware of the VR-S1000 to a version later than 2.37.
CVE-2023-46711 allows attackers to analyze and potentially exploit a hard-coded cryptographic key, compromising user accounts.
Users of the Buffalo VR-S1000 firmware versions 2.37 and earlier are affected by CVE-2023-46711.
There is no official workaround for CVE-2023-46711; updating to the latest firmware is the recommended action.