2024-12-08 03:06:42 +00:00

519 lines
14 KiB
JSON

{
"id": "CVE-2017-3216",
"sourceIdentifier": "cret@cert.org",
"published": "2017-06-20T00:29:00.267",
"lastModified": "2024-11-21T03:25:03.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request."
},
{
"lang": "es",
"value": "Los routers WiMAX basados en MediaTek SDK (libmtk) que emplean un plugin httpd personalizado son vulnerables a una omisi\u00f3n de autenticaci\u00f3n. Esto permite que un atacante remoto no autenticado obtenga acceso de administrador al dispositivo realizando un cambio de contrase\u00f1a de administrador en el dispositivo mediante una petici\u00f3n POST manipulada."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:greenpacket:ox350_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A81F52A-6DD6-4631-8733-9E47C6DAC87F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:greenpacket:ox350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "327A0834-F46C-4E74-925C-D3EA1DE6941E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:bm2022_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A779549C-E231-44F7-94AB-AE12D63641E2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:bm2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F75E1B-DAA2-495B-B1CA-5228E3819F79"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:hes-309m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7239E02-7A4A-476B-AAF9-EF72D3A9407F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:hes-309m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA39FE7-9B9E-443A-B41A-CADDCC4F544C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:hes-319m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36923E11-A6AA-41C5-A3F7-8350A9053D86"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:hes-319m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0863C568-5A6A-4961-B628-299D0E7A54E7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:hes-319m2w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03234F0A-1CD6-4087-829A-2CB15022A200"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:hes-319m2w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E48D770-DD54-4980-A8C4-359CF5DEF7A6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:hes-339m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3294BDE-B2FB-41DD-A6DE-B08B5278AA1B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:hes-339m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF51DF4-56DB-4EE9-95E4-FCFE040B3770"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mada:soho_wireless_router_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16AB1DA5-2DB6-4892-896B-F630B0765989"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mada:soho_wireless_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FD7BD1-B005-4F24-962D-5337AFD740AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zte:ox-330p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB20B496-6386-49B4-9103-45729D61F435"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zte:ox-330p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "952793D7-1F57-42F3-9379-F9A31289E4AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:max218m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F66ADE-21DF-49F0-A404-CE3EED23E178"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:max218m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC4B3ACA-0373-4574-AEE1-16E4B8D1E3BA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:max218m1w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE102CD-FFFA-4E9C-94E6-DDD3E1673A45"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:max218m1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DFAEDFB-E181-4B91-81A6-D105A401870A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:max218mw_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2DF253-7D1D-4C43-A209-681A8663044C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:max218mw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1194BED0-101B-4B23-BA0A-BE635F5FA7F8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:max308m_fimware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C0C8A2C-AA09-4326-A369-07895094BB0A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:max308m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF88B7A-4919-455F-804F-6C1A709B8147"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:max318m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52093480-956D-47D5-998F-68CE3CE69BDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:max318m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55246D23-CF70-4BE5-899D-72AE038DE262"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:max338m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9523A7F1-4F6C-4597-BC02-BA3FE729530D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zyxel:max338m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34CAEB05-E93D-45BB-9742-00CDBBCFBDE5"
}
]
}
]
}
],
"references": [
{
"url": "http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/350135",
"source": "cret@cert.org",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170607-0_Various_WiMAX_CPEs_Authentication_Bypass_v10.txt",
"source": "cret@cert.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/350135",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170607-0_Various_WiMAX_CPEs_Authentication_Bypass_v10.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}