{"api_version":"1","generated_at":"2026-05-13T13:01:23+00:00","cve":"CVE-2017-2236","urls":{"html":"https://cve.report/CVE-2017-2236","api":"https://cve.report/api/cve/CVE-2017-2236.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-2236","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-2236"},"summary":{"title":"CVE-2017-2236","description":"Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges.","state":"PUBLISHED","assigner":"jpcert","published_at":"2017-07-07 13:29:01","updated_at":"2025-04-20 01:37:25"},"problem_types":["CWE-798","Use of Hard-coded Credentials"],"metrics":[{"version":"3.0","source":"nvd@nist.gov","type":"Primary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://jvn.jp/en/jp/JVN85901441/index.html","name":"http://jvn.jp/en/jp/JVN85901441/index.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"JVN#85901441: Multiple vulnerabilities in Toshiba Lighting & Technology Corporation Home gateway","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-2236","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2236","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Toshiba Lighting & Technology Corporation","product":"Toshiba Home gateway HEM-GW16A","version":"affected firmware HEM-GW16A-FW-V1.2.0 and earlier","platforms":[]},{"source":"CNA","vendor":"Toshiba Lighting & Technology Corporation","product":"Toshiba Home gateway HEM-GW26A","version":"affected firmware HEM-GW26A-FW-V1.2.0 and earlier","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"2236","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"toshiba","cpe5":"hem-gw16a","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"2236","vulnerable":"1","versionEndIncluding":"1.2.0","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"toshiba","cpe5":"hem-gw16a_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"2236","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"toshiba","cpe5":"hem-gw26a","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"2236","vulnerable":"1","versionEndIncluding":"1.2.0","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"toshiba","cpe5":"hem-gw26a_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-05T13:48:05.063Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"JVN#85901441","tags":["third-party-advisory","x_refsource_JVN","x_transferred"],"url":"http://jvn.jp/en/jp/JVN85901441/index.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"Toshiba Home gateway HEM-GW16A","vendor":"Toshiba Lighting & Technology Corporation","versions":[{"status":"affected","version":"firmware HEM-GW16A-FW-V1.2.0 and earlier"}]},{"product":"Toshiba Home gateway HEM-GW26A","vendor":"Toshiba Lighting & Technology Corporation","versions":[{"status":"affected","version":"firmware HEM-GW26A-FW-V1.2.0 and earlier"}]}],"datePublic":"2017-06-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges."}],"problemTypes":[{"descriptions":[{"description":"Use of Hard-coded Credentials","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-07T12:57:01.000Z","orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert"},"references":[{"name":"JVN#85901441","tags":["third-party-advisory","x_refsource_JVN"],"url":"http://jvn.jp/en/jp/JVN85901441/index.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vultures@jpcert.or.jp","ID":"CVE-2017-2236","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Toshiba Home gateway HEM-GW16A","version":{"version_data":[{"version_value":"firmware HEM-GW16A-FW-V1.2.0 and earlier"}]}},{"product_name":"Toshiba Home gateway HEM-GW26A","version":{"version_data":[{"version_value":"firmware HEM-GW26A-FW-V1.2.0 and earlier"}]}}]},"vendor_name":"Toshiba Lighting & Technology Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Use of Hard-coded Credentials"}]}]},"references":{"reference_data":[{"name":"JVN#85901441","refsource":"JVN","url":"http://jvn.jp/en/jp/JVN85901441/index.html"}]}}}},"cveMetadata":{"assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","cveId":"CVE-2017-2236","datePublished":"2017-07-07T13:00:00.000Z","dateReserved":"2016-12-01T00:00:00.000Z","dateUpdated":"2024-08-05T13:48:05.063Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2017-07-07 13:29:01","lastModifiedDate":"2025-04-20 01:37:25","problem_types":["CWE-798","Use of Hard-coded Credentials"],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:toshiba:hem-gw16a_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.0","matchCriteriaId":"D34FB0D3-9DB4-4DD3-A755-239F9127EA79"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:toshiba:hem-gw16a:-:*:*:*:*:*:*:*","matchCriteriaId":"6D9C8238-D8C8-46CD-993F-3A49C1627BE1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:toshiba:hem-gw26a_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.0","matchCriteriaId":"4A511ECD-B10E-4482-8E2D-DE24767060EA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:toshiba:hem-gw26a:-:*:*:*:*:*:*:*","matchCriteriaId":"1D699E38-BB97-4831-B5BF-E1DF1735ABEB"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"2236","Ordinal":"1","Title":"CVE-2017-2236","CVE":"CVE-2017-2236","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"2236","Ordinal":"1","NoteData":"Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges.","Type":"Description","Title":"CVE-2017-2236"},{"CveYear":"2017","CveId":"2236","Ordinal":"2","NoteData":"2017-07-07","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"2236","Ordinal":"3","NoteData":"2017-07-07","Type":"Other","Title":"Modified"}]}}}