// For flags

CVE-2019-13268

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)

Los dispositivos TP-Link Archer C3200 V1 y Archer C2 V1 tienen una compartimentación insuficiente entre una red host y una red de invitados establecida por el mismo dispositivo. Reenvían las peticiones ARP, que se envían como paquetes de broadcast, entre el host y las redes de invitados. Para utilizar esta fuga como un canal encubierto directo, el remitente puede emitir trivialmente una solicitud ARP a un equipo arbitrario de la red. (En general, algunos routers restringen el reenvío ARP solo a las solicitudes destinadas a la máscara de subred de la red, pero estos enrutadores no restringieron este tráfico de ninguna manera. Dependiendo de este factor, uno debe utilizar los 8 bits más bajos de la dirección IP, o los 32 bits enteros, como la carga útil de datos.)

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-04 CVE Reserved
  • 2019-08-27 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tp-link
Search vendor "Tp-link"
Archer C3200 V1 Firmware
Search vendor "Tp-link" for product "Archer C3200 V1 Firmware"
--
Affected
in Tp-link
Search vendor "Tp-link"
Archer C3200 V1
Search vendor "Tp-link" for product "Archer C3200 V1"
--
Safe
Tp-link
Search vendor "Tp-link"
Archer C2 V1 Firmware
Search vendor "Tp-link" for product "Archer C2 V1 Firmware"
--
Affected
in Tp-link
Search vendor "Tp-link"
Archer C2 V1
Search vendor "Tp-link" for product "Archer C2 V1"
--
Safe