News:

Buffalo provides Data Recovery services. Read about it here.

Main Menu

vulnerability found in Buffalo TeraStation!!!

Started by jangiskhan, August 23, 2019, 08:40:22 AM

Previous topic - Next topic

jangiskhan

I am using Buffalo TeraStation -- TS-X8.0TL/R5 model



there is 4 vulnerability found.
1.Remote User List Disclosure Using NetBIOS
2.Null Session/Password NetBIOS Access

How to fix the vulnerability

1000001101000

Someone else posted about what I believe to be the same thing (they included the CVE#'s from their results).

That thread is here:
http://forums.buffalotech.com/index.php?topic=28463.msg95114#msg95114

Part of working with vulnerability scanners is reading the results and researching the specific vulnerabilities being reported and determining how to deal with them. This often involves configuration changes like changing weak passwords, removing public permissions or even disabling unneeded features.

Eastmarch

TS-X is EOL and will likely only get truly security-shattering patches.

Those two are common and not exactly 'vulnerabilities' in the sense that unauthorized attackers can execute code on the box. Those are more a 'security hygiene' issue.
**A single copy of data, even on a RAID array, is NOT a backup! Hard drive failure is not a question of IF, but WHEN! Don't take my word for it, take Google's!**

Browser ID: smf (is_webkit)
Templates: 4: index (default), Display (default), GenericControls (default), GenericControls (default).
Sub templates: 6: init, html_above, body_above, main, body_below, html_below.
Language files: 5: index+Modifications.english (default), Post.english (default), Editor.english (default), Drafts.english (default), StopForumSpam.english (default).
Style sheets: 4: index.css, attachments.css, jquery.sceditor.css, responsive.css.
Hooks called: 164 (show)
Files included: 35 - 1354KB. (show)
Memory used: 955KB.
Tokens: post-login.
Queries used: 15.

[Show Queries]