CVE-2022-40966: Authentication Bypass in BUFFALO INC. Buffalo network devices
Authentication bypass vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to bypass authentication and access the device. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and earlier, WHR-HP-GN firmware Ver. 1.87 and earlier, WPL-05G300 firmware Ver. 1.88 and earlier, WRM-D2133HP firmware Ver. 2.85 and earlier, WRM-D2133HS firmware Ver. 2.96 and earlier, WTR-M2133HP firmware Ver. 2.85 and earlier, WTR-M2133HS firmware Ver. 2.96 and earlier, WXR-1900DHP firmware Ver. 2.50 and earlier, WXR-1900DHP2 firmware Ver. 2.59 and earlier, WXR-1900DHP3 firmware Ver. 2.63 and earlier, WXR-5950AX12 firmware Ver. 3.40 and earlier, WXR-6000AX12B firmware Ver. 3.40 and earlier, WXR-6000AX12S firmware Ver. 3.40 and earlier, WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, WZR-1750DHP2 firmware Ver. 2.31 and earlier, WZR-HP-AG300H firmware Ver. 1.76 and earlier, WZR-HP-G302H firmware Ver. 1.86 and earlier, WEM-1266 firmware Ver. 2.85 and earlier, WEM-1266WP firmware Ver. 2.85 and earlier, WLAE-AG300N firmware Ver. 1.86 and earlier, FS-600DHP firmware Ver. 3.40 and earlier, FS-G300N firmware Ver. 3.14 and earlier, FS-HP-G300N firmware Ver. 3.33 and earlier, FS-R600DHP firmware Ver. 3.40 and earlier, BHR-4GRV firmware Ver. 2.00 and earlier, DWR-HP-G300NH firmware Ver. 1.84 and earlier, DWR-PG firmware Ver. 1.83 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WER-A54G54 firmware Ver. 1.43 and earlier, WER-AG54 firmware Ver. 1.43 and earlier, WER-AM54G54 firmware Ver. 1.43 and earlier, WER-AMG54 firmware Ver. 1.43 and earlier, WHR-300 firmware Ver. 2.00 and earlier, WHR-300HP firmware Ver. 2.00 and earlier, WHR-AM54G54 firmware Ver. 1.43 and earlier, WHR-AMG54 firmware Ver. 1.43 and earlier, WHR-AMPG firmware Ver. 1.52 and earlier, WHR-G firmware Ver. 1.49 and earlier, WHR-G300N firmware Ver. 1.65 and earlier, WHR-G301N firmware Ver. 1.87 and earlier, WHR-G54S firmware Ver. 1.43 and earlier, WHR-G54S-NI firmware Ver. 1.24 and earlier, WHR-HP-AMPG firmware Ver. 1.43 and earlier, WHR-HP-G firmware Ver. 1.49 and earlier, WHR-HP-G54 firmware Ver. 1.43 and earlier, WLI-H4-D600 firmware Ver. 1.88 and earlier, WS024BF firmware Ver. 1.60 and earlier, WS024BF-NW firmware Ver. 1.60 and earlier, WXR-1750DHP firmware Ver. 2.60 and earlier, WXR-1750DHP2 firmware Ver. 2.60 and earlier, WZR-1166DHP firmware Ver. 2.18 and earlier, WZR-1166DHP2 firmware Ver. 2.18 and earlier, WZR-1750DHP firmware Ver. 2.30 and earlier, WZR2-G300N firmware Ver. 1.55 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, WZR-600DHP3 firmware Ver. 2.19 and earlier, WZR-900DHP2 firmware Ver. 2.19 and earlier, WZR-AGL300NH firmware Ver. 1.55 and earlier, WZR-AMPG144NH firmware Ver. 1.49 and earlier, WZR-AMPG300NH firmware Ver. 1.51 and earlier, WZR-D1100H firmware Ver. 2.00 and earlier, WZR-G144N firmware Ver. 1.48 and earlier, WZR-G144NH firmware Ver. 1.48 and earlier, WZR-HP-G300NH firmware Ver. 1.84 and earlier, WZR-HP-G301NH firmware Ver. 1.84 and earlier, WZR-HP-G450H firmware Ver. 1.90 and earlier, WZR-S1750DHP firmware Ver. 2.32 and earlier, WZR-S600DHP firmware Ver. 2.19 and earlier, and WZR-S900DHP firmware Ver. 2.19 and earlier.
AI Analysis
Technical Summary
CVE-2022-40966 is a high-severity authentication bypass vulnerability affecting a broad range of Buffalo Inc. network devices, including routers, wireless access points, and repeaters. The vulnerability allows a network-adjacent attacker to bypass authentication mechanisms and gain unauthorized access to the device's management interface without requiring valid credentials or user interaction. The affected devices span numerous models and firmware versions, generally those with firmware versions at or below specific thresholds (e.g., WCR-300 firmware version 1.87 and earlier, WXR-6000AX12B firmware version 3.40 and earlier, among many others). The vulnerability is classified under CWE-287 (Improper Authentication), indicating a fundamental flaw in the authentication logic or implementation. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Exploitation would allow an attacker on the same local network or connected via adjacent network segments to fully control the device, potentially changing configurations, intercepting or redirecting network traffic, or launching further attacks within the network. No known exploits in the wild have been reported yet, but the extensive list of affected devices and the ease of exploitation make this a critical concern for organizations using Buffalo network equipment. The vulnerability affects a wide range of consumer and enterprise-grade devices, increasing the attack surface significantly. The lack of authentication requirement and no need for user interaction further exacerbate the risk, enabling automated or stealthy attacks from within the network perimeter.
Potential Impact
For European organizations, the impact of CVE-2022-40966 can be severe. Buffalo network devices are commonly used in small to medium enterprises, branch offices, and some consumer environments across Europe. Successful exploitation can lead to complete compromise of the affected network devices, allowing attackers to intercept sensitive communications, manipulate network traffic, deploy malware, or pivot to other internal systems. This threatens the confidentiality of corporate data, the integrity of network configurations, and the availability of network services. Given the critical role of network infrastructure in business continuity, exploitation could result in operational disruptions, data breaches, and regulatory non-compliance, especially under GDPR requirements for protecting personal data. The vulnerability also poses risks to critical infrastructure sectors if Buffalo devices are deployed there, potentially impacting public safety and essential services. The broad range of affected firmware versions and devices means many organizations may be unknowingly exposed, particularly if firmware updates have not been applied. The lack of known exploits in the wild currently provides a window for mitigation, but the high severity score and ease of exploitation necessitate urgent action to prevent potential attacks.
Mitigation Recommendations
1. Immediate Firmware Update: Organizations should promptly identify all Buffalo network devices in their environment and verify firmware versions. They must apply the latest firmware updates provided by Buffalo Inc. that address CVE-2022-40966. Since the vendor has not provided direct patch links in the provided information, organizations should consult Buffalo's official support channels or JVN advisories for updated firmware. 2. Network Segmentation: Isolate Buffalo devices on dedicated network segments with strict access controls to limit exposure to only trusted management stations. 3. Access Control Lists (ACLs): Implement ACLs on upstream network devices to restrict management interface access to authorized IP addresses only, reducing the risk of network-adjacent attackers reaching vulnerable devices. 4. Disable Remote Management: If remote management is enabled on affected devices, disable it until patches are applied to prevent external attackers from exploiting the vulnerability. 5. Monitor Network Traffic: Deploy network monitoring and intrusion detection systems to detect unusual access patterns or configuration changes on Buffalo devices. 6. Inventory and Asset Management: Maintain an up-to-date inventory of all network devices to ensure no vulnerable Buffalo devices remain unmanaged. 7. Vendor Communication: Engage with Buffalo support for confirmation of patch availability and guidance on secure configurations. 8. Incident Response Preparedness: Prepare incident response plans to quickly address any detected exploitation attempts, including device isolation and forensic analysis. These mitigations go beyond generic advice by emphasizing network-level controls, asset management, and proactive monitoring tailored to the specific nature of this authentication bypass vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-40966: Authentication Bypass in BUFFALO INC. Buffalo network devices
Description
Authentication bypass vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to bypass authentication and access the device. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and earlier, WHR-HP-GN firmware Ver. 1.87 and earlier, WPL-05G300 firmware Ver. 1.88 and earlier, WRM-D2133HP firmware Ver. 2.85 and earlier, WRM-D2133HS firmware Ver. 2.96 and earlier, WTR-M2133HP firmware Ver. 2.85 and earlier, WTR-M2133HS firmware Ver. 2.96 and earlier, WXR-1900DHP firmware Ver. 2.50 and earlier, WXR-1900DHP2 firmware Ver. 2.59 and earlier, WXR-1900DHP3 firmware Ver. 2.63 and earlier, WXR-5950AX12 firmware Ver. 3.40 and earlier, WXR-6000AX12B firmware Ver. 3.40 and earlier, WXR-6000AX12S firmware Ver. 3.40 and earlier, WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, WZR-1750DHP2 firmware Ver. 2.31 and earlier, WZR-HP-AG300H firmware Ver. 1.76 and earlier, WZR-HP-G302H firmware Ver. 1.86 and earlier, WEM-1266 firmware Ver. 2.85 and earlier, WEM-1266WP firmware Ver. 2.85 and earlier, WLAE-AG300N firmware Ver. 1.86 and earlier, FS-600DHP firmware Ver. 3.40 and earlier, FS-G300N firmware Ver. 3.14 and earlier, FS-HP-G300N firmware Ver. 3.33 and earlier, FS-R600DHP firmware Ver. 3.40 and earlier, BHR-4GRV firmware Ver. 2.00 and earlier, DWR-HP-G300NH firmware Ver. 1.84 and earlier, DWR-PG firmware Ver. 1.83 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WER-A54G54 firmware Ver. 1.43 and earlier, WER-AG54 firmware Ver. 1.43 and earlier, WER-AM54G54 firmware Ver. 1.43 and earlier, WER-AMG54 firmware Ver. 1.43 and earlier, WHR-300 firmware Ver. 2.00 and earlier, WHR-300HP firmware Ver. 2.00 and earlier, WHR-AM54G54 firmware Ver. 1.43 and earlier, WHR-AMG54 firmware Ver. 1.43 and earlier, WHR-AMPG firmware Ver. 1.52 and earlier, WHR-G firmware Ver. 1.49 and earlier, WHR-G300N firmware Ver. 1.65 and earlier, WHR-G301N firmware Ver. 1.87 and earlier, WHR-G54S firmware Ver. 1.43 and earlier, WHR-G54S-NI firmware Ver. 1.24 and earlier, WHR-HP-AMPG firmware Ver. 1.43 and earlier, WHR-HP-G firmware Ver. 1.49 and earlier, WHR-HP-G54 firmware Ver. 1.43 and earlier, WLI-H4-D600 firmware Ver. 1.88 and earlier, WS024BF firmware Ver. 1.60 and earlier, WS024BF-NW firmware Ver. 1.60 and earlier, WXR-1750DHP firmware Ver. 2.60 and earlier, WXR-1750DHP2 firmware Ver. 2.60 and earlier, WZR-1166DHP firmware Ver. 2.18 and earlier, WZR-1166DHP2 firmware Ver. 2.18 and earlier, WZR-1750DHP firmware Ver. 2.30 and earlier, WZR2-G300N firmware Ver. 1.55 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, WZR-600DHP3 firmware Ver. 2.19 and earlier, WZR-900DHP2 firmware Ver. 2.19 and earlier, WZR-AGL300NH firmware Ver. 1.55 and earlier, WZR-AMPG144NH firmware Ver. 1.49 and earlier, WZR-AMPG300NH firmware Ver. 1.51 and earlier, WZR-D1100H firmware Ver. 2.00 and earlier, WZR-G144N firmware Ver. 1.48 and earlier, WZR-G144NH firmware Ver. 1.48 and earlier, WZR-HP-G300NH firmware Ver. 1.84 and earlier, WZR-HP-G301NH firmware Ver. 1.84 and earlier, WZR-HP-G450H firmware Ver. 1.90 and earlier, WZR-S1750DHP firmware Ver. 2.32 and earlier, WZR-S600DHP firmware Ver. 2.19 and earlier, and WZR-S900DHP firmware Ver. 2.19 and earlier.
AI-Powered Analysis
Technical Analysis
CVE-2022-40966 is a high-severity authentication bypass vulnerability affecting a broad range of Buffalo Inc. network devices, including routers, wireless access points, and repeaters. The vulnerability allows a network-adjacent attacker to bypass authentication mechanisms and gain unauthorized access to the device's management interface without requiring valid credentials or user interaction. The affected devices span numerous models and firmware versions, generally those with firmware versions at or below specific thresholds (e.g., WCR-300 firmware version 1.87 and earlier, WXR-6000AX12B firmware version 3.40 and earlier, among many others). The vulnerability is classified under CWE-287 (Improper Authentication), indicating a fundamental flaw in the authentication logic or implementation. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Exploitation would allow an attacker on the same local network or connected via adjacent network segments to fully control the device, potentially changing configurations, intercepting or redirecting network traffic, or launching further attacks within the network. No known exploits in the wild have been reported yet, but the extensive list of affected devices and the ease of exploitation make this a critical concern for organizations using Buffalo network equipment. The vulnerability affects a wide range of consumer and enterprise-grade devices, increasing the attack surface significantly. The lack of authentication requirement and no need for user interaction further exacerbate the risk, enabling automated or stealthy attacks from within the network perimeter.
Potential Impact
For European organizations, the impact of CVE-2022-40966 can be severe. Buffalo network devices are commonly used in small to medium enterprises, branch offices, and some consumer environments across Europe. Successful exploitation can lead to complete compromise of the affected network devices, allowing attackers to intercept sensitive communications, manipulate network traffic, deploy malware, or pivot to other internal systems. This threatens the confidentiality of corporate data, the integrity of network configurations, and the availability of network services. Given the critical role of network infrastructure in business continuity, exploitation could result in operational disruptions, data breaches, and regulatory non-compliance, especially under GDPR requirements for protecting personal data. The vulnerability also poses risks to critical infrastructure sectors if Buffalo devices are deployed there, potentially impacting public safety and essential services. The broad range of affected firmware versions and devices means many organizations may be unknowingly exposed, particularly if firmware updates have not been applied. The lack of known exploits in the wild currently provides a window for mitigation, but the high severity score and ease of exploitation necessitate urgent action to prevent potential attacks.
Mitigation Recommendations
1. Immediate Firmware Update: Organizations should promptly identify all Buffalo network devices in their environment and verify firmware versions. They must apply the latest firmware updates provided by Buffalo Inc. that address CVE-2022-40966. Since the vendor has not provided direct patch links in the provided information, organizations should consult Buffalo's official support channels or JVN advisories for updated firmware. 2. Network Segmentation: Isolate Buffalo devices on dedicated network segments with strict access controls to limit exposure to only trusted management stations. 3. Access Control Lists (ACLs): Implement ACLs on upstream network devices to restrict management interface access to authorized IP addresses only, reducing the risk of network-adjacent attackers reaching vulnerable devices. 4. Disable Remote Management: If remote management is enabled on affected devices, disable it until patches are applied to prevent external attackers from exploiting the vulnerability. 5. Monitor Network Traffic: Deploy network monitoring and intrusion detection systems to detect unusual access patterns or configuration changes on Buffalo devices. 6. Inventory and Asset Management: Maintain an up-to-date inventory of all network devices to ensure no vulnerable Buffalo devices remain unmanaged. 7. Vendor Communication: Engage with Buffalo support for confirmation of patch availability and guidance on secure configurations. 8. Incident Response Preparedness: Prepare incident response plans to quickly address any detected exploitation attempts, including device isolation and forensic analysis. These mitigations go beyond generic advice by emphasizing network-level controls, asset management, and proactive monitoring tailored to the specific nature of this authentication bypass vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2022-09-27T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9847c4522896dcbf547d
Added to database: 5/21/2025, 9:09:27 AM
Last enriched: 6/21/2025, 9:39:09 PM
Last updated: 8/2/2025, 5:12:10 AM
Views: 11
Related Threats
CVE-2025-7973: CWE-268: Privilege Chaining in Rockwell Automation FactoryTalk® ViewPoint
HighCVE-2025-7773: CWE-863: Incorrect Authorization in Rockwell Automation 5032-CFGB16M12P5DR
HighCVE-2025-43984: n/a
UnknownCVE-2025-36581: CWE-788: Access of Memory Location After End of Buffer in Dell PowerEdge
LowCVE-2025-9036: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Rockwell Automation FactoryTalk® Action Manager
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.