January 28, 2008
>> JAPANESE
Information-technology Promotion Agency, Japan (IPA, Chairman Buheita Fujiwara) has issued the Security Alert for Vulnerability in Multiple YAMAHA Routers on January 28, 2008.
This vulnerability allows an attacker to make the user execute unintended administrative operations if the user accesses a malicious web site while logged in on the web administration console of the YAMAHA routers.
When exploited, an attacker could make unauthorized changes, sucha as changing the administrator password and the configuration settings.
To fix the problem, update the firmware to the latest version or change the configuration setting.
Multiple YAMAHA routers, for instance, SRT100 (firewall router), RT58i (broadband VoIP router) and RTX1100 (Ethernet access VPN router), provide the web administration interface to configure the router settings. This web administration console has a cross-site request forgery (CSRF) vulnerability that makes a user execute unintended administrative operations if the user views a malicious web page while logged in on the web administration console.
For information on the affected products, please refer to:
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html (in Japanese)
For the latest information on the vulnerability, please refer to:
http://jvndb.jvn.jp/contents/en/2008/JVNDB-2008-000005.html
The following creditee reported this vulnerability to IPA on October 16, 2007. JPCERT Coordination Center (JPCERT/CC) coordinated with the product vendors and published the vulnerability on January 28, 2008, under Information Security Early Warning Partnership.
Credit: Hirotaka Katagiri
An attacker could change the administrator password or other configuration settings if a user views a malicious web page while logged in on the web administration console.
As a result, the attacker could modify the important settings and take control over the router.

To fix the problem, update the firmware to the latest version or change the configuration setting. Check out the following information YAMAHA provides and take appropriate action for the solution differs depending on the affected product.
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN88575577.html (in Japanese)
| Severity Rating (CVSS base score) |
□ Low (0.0~3.9) |
■ Medium (4.0~6.9) |
□ High (7.0~10.0) |
|---|---|---|---|
| CVSS base score | 4.0 |
| AV:Access Vector | □ Local | □ Adjacent Network |
■ Network |
|---|---|---|---|
| AC:Access Complexity | ■ High | □ Medium | □ Low |
| Au:Authentication | □ Multiple | □ Single | ■ None |
| C:Confidentiality Impact | ■ None | □ Partial | □ Complete |
| I:Integrity Impact | □ None | ■ Partial | □ Complete |
| A:Availability Impact | □ None | ■ Partial | □ Complete |
■:Selected Values
IT Security Center,
Information-technology Promotion Agency, Japan (ISEC/IPA)
E-mail: ![]()