First published: Mon Apr 15 2024(Updated: )
Plaintext storage of a password issue exists in BUFFALO wireless LAN routers, which may allow a network-adjacent unauthenticated attacker with access to the product's login page may obtain configured credentials.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
BUFFALO Wireless LAN Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23486 has been classified as a high severity vulnerability due to the potential for an attacker to access sensitive credentials.
To fix CVE-2024-23486, users should update their BUFFALO wireless LAN routers to the latest firmware version provided by the manufacturer.
CVE-2024-23486 affects users of BUFFALO wireless LAN routers that store passwords in plaintext.
An attacker can exploit CVE-2024-23486 by accessing the router’s login page and retrieving stored plaintext passwords.
As of now, there is no public indication that CVE-2024-23486 is being actively exploited, but it is recommended to take precautionary measures.