{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T01:09:38.609","vulnerabilities":[{"cve":{"id":"CVE-2023-45194","sourceIdentifier":"vultures@jpcert.or.jp","published":"2023-10-11T01:15:08.837","lastModified":"2024-11-21T08:26:31.473","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration."},{"lang":"es","value":"Vulnerabilidad del uso de credenciales predeterminadas en la versión del firmware MR-GM2. 3.00.03 y anteriores, y firmware MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) versión 1.03.45 y anteriores, permiten que un atacante no autenticado adyacente a la red intercepte la comunicación LAN inalámbrica, cuando el producto afectado realiza la comunicación sin cambiar la clave precompartida de la configuración predeterminada de fábrica."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mrl:mr-gm3-d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.04.00","matchCriteriaId":"1726D73D-B4B1-48FC-A9B7-3E7AF28D0B3B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mrl:mr-gm3-d:-:*:*:*:*:*:*:*","matchCriteriaId":"BF17D8F8-FC31-4347-BA96-EF4D045C1137"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mrl:mr-gm3-k_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.04.00","matchCriteriaId":"6CA08A4E-55AF-4D93-AF24-2AD07FABB240"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mrl:mr-gm3-k:-:*:*:*:*:*:*:*","matchCriteriaId":"3569FBAB-96FD-429E-9B7D-B649B72000FB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mrl:mr-gm3-s_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.04.00","matchCriteriaId":"FD9946EF-FC18-4BB3-8106-2E21E1A76348"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mrl:mr-gm3-s:-:*:*:*:*:*:*:*","matchCriteriaId":"A4254C71-AED3-4742-B729-F774AD6B8488"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mrl:mr-gm3-dks_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.04.00","matchCriteriaId":"6209AA44-C988-461A-B414-DB52D6D2585C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mrl:mr-gm3-dks:-:*:*:*:*:*:*:*","matchCriteriaId":"C28E168A-0909-4F45-8F7B-F4794B1ACCA6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mrl:mr-gm3-m_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.04.00","matchCriteriaId":"2EBAF1A9-236D-4705-A48A-5A3D314AB5F6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mrl:mr-gm3-m:-:*:*:*:*:*:*:*","matchCriteriaId":"737E83DE-5093-4CD8-BBE9-74501AC4FD3E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mrl:mr-gm2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.01.00","matchCriteriaId":"BC11B5A2-ED94-4120-AE8F-4F7DD8D71AAB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mrl:mr-gm2:-:*:*:*:*:*:*:*","matchCriteriaId":"ED3DDF43-3F12-4089-8601-900E2D9B81CB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mrl:mr-gm3-w_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.04.00","matchCriteriaId":"61E94B12-55B5-4600-A00C-E22576907C84"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mrl:mr-gm3-w:-:*:*:*:*:*:*:*","matchCriteriaId":"BBA48838-60EB-4FF8-8C91-48F176550553"}]}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU99039725/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.mrl.co.jp/20231005_security/","source":"vultures@jpcert.or.jp","tags":["Patch","Vendor Advisory"]},{"url":"https://jvn.jp/en/vu/JVNVU99039725/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.mrl.co.jp/20231005_security/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}