diff --git a/2017/12xxx/CVE-2017-12083.json b/2017/12xxx/CVE-2017-12083.json index 5c2b3737719..8fd93b85726 100644 --- a/2017/12xxx/CVE-2017-12083.json +++ b/2017/12xxx/CVE-2017-12083.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-12083", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable information disclosure vulnerability exists in the apid daemon of the Circle with Disney running firmware 2.0.1. A specially crafted set of packets can make the Disney Circle dump strings from an internal database into an HTTP response. An attacker needs network connectivity to the Internet to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "authentication bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0435" } ] } diff --git a/2017/12xxx/CVE-2017-12084.json b/2017/12xxx/CVE-2017-12084.json index d2b604d7413..a50cd46fe2c 100644 --- a/2017/12xxx/CVE-2017-12084.json +++ b/2017/12xxx/CVE-2017-12084.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-12084", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "A backdoor vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. A specific set of network packets can remotely start an SSH server on the device, resulting in a persistent backdoor. An attacker send an API call to enable the SSH server." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "SSH server enabling" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0436" } ] } diff --git a/2017/12xxx/CVE-2017-12085.json b/2017/12xxx/CVE-2017-12085.json index 32668d4bf23..b1472748999 100644 --- a/2017/12xxx/CVE-2017-12085.json +++ b/2017/12xxx/CVE-2017-12085.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-12085", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable routing vulnerability exists in the Circle with Disney cloud infrastructure. A specially crafted packet can make the Circle cloud route a packet to any arbitrary Circle device. An attacker needs network connectivity to the Internet to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "routing exploit" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0437" } ] } diff --git a/2017/12xxx/CVE-2017-12094.json b/2017/12xxx/CVE-2017-12094.json index 54ce043d870..1920dba09df 100644 --- a/2017/12xxx/CVE-2017-12094.json +++ b/2017/12xxx/CVE-2017-12094.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-12094", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "arbitrary code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0446" } ] } diff --git a/2017/12xxx/CVE-2017-12096.json b/2017/12xxx/CVE-2017-12096.json index 5f0218edc29..9c77eca429c 100644 --- a/2017/12xxx/CVE-2017-12096.json +++ b/2017/12xxx/CVE-2017-12096.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-12096", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the WiFi management of Circle with Disney. A crafted Access Point with the same name as the legitimate one, can be used to make Circle connect to an untrusted network. An attacker needs to setup an Access Point reachable by the device and to send a series of spoofed \"deauth\" packets to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "access point deauthorization" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0448" } ] } diff --git a/2017/2xxx/CVE-2017-2864.json b/2017/2xxx/CVE-2017-2864.json index b5ab4a94724..0a5ce3b6425 100644 --- a/2017/2xxx/CVE-2017-2864.json +++ b/2017/2xxx/CVE-2017-2864.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2864", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the generation of authentication token functionality of Circle with Disney. Specially crafted network packets can cause a valid authentication token to be returned to the attacker resulting in authentication bypass. An attacker can send a series of packets to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "authentication bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0370" } ] } diff --git a/2017/2xxx/CVE-2017-2865.json b/2017/2xxx/CVE-2017-2865.json index d742103252f..dbc43916fd5 100644 --- a/2017/2xxx/CVE-2017-2865.json +++ b/2017/2xxx/CVE-2017-2865.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2865", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "command injection" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0371" } ] } diff --git a/2017/2xxx/CVE-2017-2866.json b/2017/2xxx/CVE-2017-2866.json index af2999e17db..8315894e46d 100644 --- a/2017/2xxx/CVE-2017-2866.json +++ b/2017/2xxx/CVE-2017-2866.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2866", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the /api/CONFIG/backup functionality of Circle with Disney. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "command injection" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0372" } ] } diff --git a/2017/2xxx/CVE-2017-2881.json b/2017/2xxx/CVE-2017-2881.json index 38f780842c6..c19dd11e265 100644 --- a/2017/2xxx/CVE-2017-2881.json +++ b/2017/2xxx/CVE-2017-2881.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2881", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the torlist update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "remote code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0388" } ] } diff --git a/2017/2xxx/CVE-2017-2882.json b/2017/2xxx/CVE-2017-2882.json index 49795f957ba..c8f72f8c20d 100644 --- a/2017/2xxx/CVE-2017-2882.json +++ b/2017/2xxx/CVE-2017-2882.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2882", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the servers update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to overwrite sensitive files, resulting in code execution. An attacker needs to impersonate a remote server in order to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "remote code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0389" } ] } diff --git a/2017/2xxx/CVE-2017-2883.json b/2017/2xxx/CVE-2017-2883.json index ed86734a18e..2252f18fde5 100644 --- a/2017/2xxx/CVE-2017-2883.json +++ b/2017/2xxx/CVE-2017-2883.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2883", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the database update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to execute arbitrary code. An attacker needs to impersonate a remote server in order to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "remote code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0390" } ] } diff --git a/2017/2xxx/CVE-2017-2884.json b/2017/2xxx/CVE-2017-2884.json index aad2f995806..c8688e05d41 100644 --- a/2017/2xxx/CVE-2017-2884.json +++ b/2017/2xxx/CVE-2017-2884.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2884", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the user photo update functionality of Circle with Disney running firmware 2.0.1. A repeated set of specially crafted API calls can cause the device to corrupt essential memory, resulting in a bricked device. An attacker needs network connectivity to the device to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "authentication bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0391" } ] } diff --git a/2017/2xxx/CVE-2017-2889.json b/2017/2xxx/CVE-2017-2889.json index a57416e90c6..a06f495a498 100644 --- a/2017/2xxx/CVE-2017-2889.json +++ b/2017/2xxx/CVE-2017-2889.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2889", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable Denial of Service vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A large amount of simultaneous TCP connections causes the APID daemon to repeatedly fork, causing the daemon to run out of memory and trigger a device reboot. An attacker needs network connectivity to the device to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "authentication bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0396" } ] } diff --git a/2017/2xxx/CVE-2017-2890.json b/2017/2xxx/CVE-2017-2890.json index 3e1cebcd066..a667a2163b5 100644 --- a/2017/2xxx/CVE-2017-2890.json +++ b/2017/2xxx/CVE-2017-2890.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2890", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "command injection" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0397" } ] } diff --git a/2017/2xxx/CVE-2017-2891.json b/2017/2xxx/CVE-2017-2891.json index 9cc1e467603..274975d9895 100644 --- a/2017/2xxx/CVE-2017-2891.json +++ b/2017/2xxx/CVE-2017-2891.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2891", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable use-after-free vulnerability exists in the HTTP server implementation of Cesanta Mongoose 6.8. An ordinary HTTP POST request with a CGI target can cause a reuse of previously freed pointer potentially resulting in remote code execution. An attacker needs to send this HTTP request over network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "remote code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0398" } ] } diff --git a/2017/2xxx/CVE-2017-2892.json b/2017/2xxx/CVE-2017-2892.json index 2fd5126a829..13dc78eefc8 100644 --- a/2017/2xxx/CVE-2017-2892.json +++ b/2017/2xxx/CVE-2017-2892.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2892", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable arbitrary memory read vulnerability exists in the MQTT packet parsing functionality of Cesanta Mongoose 6.8. A specially crafted MQTT packet can cause an arbitrary out-of-bounds memory read and write potentially resulting in information disclosure, denial of service and remote code execution. An attacker needs to send a specially crafted MQTT packet over network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "remote code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0399" } ] } diff --git a/2017/2xxx/CVE-2017-2893.json b/2017/2xxx/CVE-2017-2893.json index b2dcd40aab8..9ffe6ffd2e2 100644 --- a/2017/2xxx/CVE-2017-2893.json +++ b/2017/2xxx/CVE-2017-2893.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2893", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable NULL pointer dereference vulnerability exists in the MQTT packet parsing functionality of Cesanta Mongoose 6.8. An MQTT SUBSCRIBE packet can cause a NULL pointer dereference leading to server crash and denial of service. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "denial of service" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0400" } ] } diff --git a/2017/2xxx/CVE-2017-2894.json b/2017/2xxx/CVE-2017-2894.json index 83a4261d967..aad0acb8521 100644 --- a/2017/2xxx/CVE-2017-2894.json +++ b/2017/2xxx/CVE-2017-2894.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2894", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable stack buffer overflow vulnerability exists in the MQTT packet parsing functionality of Cesanta Mongoose 6.8. A specially crafted MQTT SUBSCRIBE packet can cause a stack buffer overflow resulting in remote code execution. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "remote code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0401" } ] } diff --git a/2017/2xxx/CVE-2017-2895.json b/2017/2xxx/CVE-2017-2895.json index cd1efac37e3..df1b07a1219 100644 --- a/2017/2xxx/CVE-2017-2895.json +++ b/2017/2xxx/CVE-2017-2895.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2895", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable arbitrary memory read vulnerability exists in the MQTT packet parsing functionality of Cesanta Mongoose 6.8. A specially crafted MQTT SUBSCRIBE packet can cause an arbitrary out-of=bounds memory read potentially resulting in information disclosure and denial of service. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "denial of service" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0402" } ] } diff --git a/2017/2xxx/CVE-2017-2898.json b/2017/2xxx/CVE-2017-2898.json index b10f668af0c..3a7a8e25003 100644 --- a/2017/2xxx/CVE-2017-2898.json +++ b/2017/2xxx/CVE-2017-2898.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2898", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the signature verification of the firmware update functionality of Circle with Disney. Specially crafted network packets can cause an unsigned firmware to be installed in the device resulting in arbitrary code execution. An attacker can send a series of packets to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "arbitrary code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405" } ] } diff --git a/2017/2xxx/CVE-2017-2909.json b/2017/2xxx/CVE-2017-2909.json index 29b709103c0..d4dd34bfd3f 100644 --- a/2017/2xxx/CVE-2017-2909.json +++ b/2017/2xxx/CVE-2017-2909.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2909", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An infinite loop programming error exists in the DNS server functionality of Cesanta Mongoose 6.8 library. A specially crafted DNS request can cause an infinite loop resulting in high CPU usage and Denial Of Service. An attacker can send a packet over network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "denial of service" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0416" } ] } diff --git a/2017/2xxx/CVE-2017-2911.json b/2017/2xxx/CVE-2017-2911.json index 975625bf438..2cd065514e6 100644 --- a/2017/2xxx/CVE-2017-2911.json +++ b/2017/2xxx/CVE-2017-2911.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2911", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the rclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "SSL certificate" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0418" } ] } diff --git a/2017/2xxx/CVE-2017-2912.json b/2017/2xxx/CVE-2017-2912.json index 7bae20c6e73..fb0542ef8e7 100644 --- a/2017/2xxx/CVE-2017-2912.json +++ b/2017/2xxx/CVE-2017-2912.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2912", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the goclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "authentication bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0419" } ] } diff --git a/2017/2xxx/CVE-2017-2913.json b/2017/2xxx/CVE-2017-2913.json index 7899cb4496f..670704b5623 100644 --- a/2017/2xxx/CVE-2017-2913.json +++ b/2017/2xxx/CVE-2017-2913.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2913", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in filtering functionality of Circle with Disney. SSL certificates for specific domain names can cause the Bluecoat library to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "authentication bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0420" } ] } diff --git a/2017/2xxx/CVE-2017-2914.json b/2017/2xxx/CVE-2017-2914.json index 26eb54600a6..13c2e61371d 100644 --- a/2017/2xxx/CVE-2017-2914.json +++ b/2017/2xxx/CVE-2017-2914.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2914", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable authentication bypass vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A specially crafted token can bypass the authentication routine of the Apid binary, causing the device to grant unintended administrative access. An attacker needs network connectivity to the device to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "authentication bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0421" } ] } diff --git a/2017/2xxx/CVE-2017-2915.json b/2017/2xxx/CVE-2017-2915.json index bbd8f0bd97d..430c09ba662 100644 --- a/2017/2xxx/CVE-2017-2915.json +++ b/2017/2xxx/CVE-2017-2915.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2915", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the WiFi configuration functionality of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary shell commands. An attacker needs to send a couple of HTTP requests and setup an access point reachable by the device to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "arbitrary code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0422" } ] } diff --git a/2017/2xxx/CVE-2017-2916.json b/2017/2xxx/CVE-2017-2916.json index 71d4c79ac76..6d63c60fb86 100644 --- a/2017/2xxx/CVE-2017-2916.json +++ b/2017/2xxx/CVE-2017-2916.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2916", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an arbitrary file to be overwritten. An attacker can send an HTTP request trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "arbitrary code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0423" } ] } diff --git a/2017/2xxx/CVE-2017-2917.json b/2017/2xxx/CVE-2017-2917.json index b56fb18e108..cd0a794dfb7 100644 --- a/2017/2xxx/CVE-2017-2917.json +++ b/2017/2xxx/CVE-2017-2917.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2917", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Circle", + "version" : { + "version_data" : [ + { + "version_value" : "firmware 2.0.1" + } + ] + } + } + ] + }, + "vendor_name" : "Circle Media" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable vulnerability exists in the notifications functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "command injection" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0424" } ] } diff --git a/2017/2xxx/CVE-2017-2921.json b/2017/2xxx/CVE-2017-2921.json index 0bb333fa24a..0145cb2a5f2 100644 --- a/2017/2xxx/CVE-2017-2921.json +++ b/2017/2xxx/CVE-2017-2921.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2921", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause an integer overflow resulting leading to heap buffer overflow resulting in denial of service and potential remote code execution. An attacker needs to send a specially crafted websocket packet over network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "denial of service" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0428" } ] } diff --git a/2017/2xxx/CVE-2017-2922.json b/2017/2xxx/CVE-2017-2922.json index c5ba87ef584..223868d9b5a 100644 --- a/2017/2xxx/CVE-2017-2922.json +++ b/2017/2xxx/CVE-2017-2922.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "talos-cna@cisco.com", + "DATE_PUBLIC" : "2017-10-31T00:00:00", "ID" : "CVE-2017-2922", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Mongoose", + "version" : { + "version_data" : [ + { + "version_value" : "6.8" + } + ] + } + } + ] + }, + "vendor_name" : "Cesanta" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over network to trigger this vulnerability." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "remote code execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0429" } ] }