Vulnerability Name:

CVE-2019-13267 (CCN-165969)

Assigned:2019-07-04
Published:2019-07-04
Updated:2020-08-24
Summary:TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
8.3 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2019-13267

Source: CCN
Type: TP-Link Web site
Archer

Source: XF
Type: UNKNOWN
tplink-cve201913267-priv-esc(165969)

Source: MISC
Type: Exploit, Third Party Advisory
https://orenlab.sise.bgu.ac.il/publications/CrossRouter

Source: CCN
Type: Usenix Web site
Cross-Router Covert Channels

Source: MISC
Type: Third Party Advisory
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf

Vulnerable Configuration:Configuration 1:
  • cpe:/o:tp-link:archer_c3200_v1_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:tp-link:archer_c3200_v1:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:tp-link:archer_c2_v1_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:tp-link:archer_c2_v1:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    tp-link archer c3200 v1 firmware -
    tp-link archer c3200 v1 -
    tp-link archer c2 v1 firmware -
    tp-link archer c2 v1 -