ID

VAR-201705-3255


CVE

CVE-2017-5173


TITLE

Geutebruck G-Cam/EFD-2250 Remote code execution vulnerability

Trust: 0.8

sources: IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4 // CNVD: CNVD-2017-01889

DESCRIPTION

An Improper Neutralization of Special Elements (in an OS command) issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An improper neutralization of special elements vulnerability has been identified. If special elements are not properly neutralized, an attacker can call multiple parameters that can allow access to the root level operating system which could allow remote code execution. The Geutebruck G-Cam/EFD-2250 provides a faster and safer solution for remote monitoring applications. A remote code execution vulnerability exists in Geutebruck G-Cam/EFD-2250. An attacker exploited the vulnerability to execute arbitrary code. A failed attack can result in a denial of service. Attackers may exploit these issues to gain unauthorized access to the affected device and to execute arbitrary code within the context of the affected device. G-Cam/EFD-2250 1.11.0.12 is vulnerable; other versions may also be affected. Geutebruck IP Camera G-Cam/EFD-2250 is a network camera produced by German Geutebruck company

Trust: 2.79

sources: NVD: CVE-2017-5173 // JVNDB: JVNDB-2017-004263 // CNVD: CNVD-2017-01889 // BID: 96209 // IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4 // VULHUB: VHN-113376 // VULMON: CVE-2017-5173

IOT TAXONOMY

category:['IoT', 'ICS']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4 // CNVD: CNVD-2017-01889

AFFECTED PRODUCTS

vendor:geutebruckmodel:g-cam/efd-2250scope:eqversion:1.11.0.12

Trust: 1.1

vendor:geutebrueckmodel:ip camera g-cam efd-2250scope:eqversion:1.11.0.12

Trust: 1.0

vendor:geutebrueckmodel:g-cam/efd-2250scope:eqversion:1.11.0.12

Trust: 0.6

vendor:geutebruckmodel:ip camera g-cam efd-2250scope:eqversion:1.11.0.12

Trust: 0.6

vendor:ip camera g cam efd 2250model: - scope:eqversion:1.11.0.12

Trust: 0.2

sources: IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4 // CNVD: CNVD-2017-01889 // BID: 96209 // JVNDB: JVNDB-2017-004263 // NVD: CVE-2017-5173 // CNNVD: CNNVD-201702-611

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-5173
value: CRITICAL

Trust: 1.8

CNVD: CNVD-2017-01889
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201702-611
value: CRITICAL

Trust: 0.6

IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4
value: CRITICAL

Trust: 0.2

VULHUB: VHN-113376
value: HIGH

Trust: 0.1

VULMON: CVE-2017-5173
value: HIGH

Trust: 0.1

NVD:
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2017-5173
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

CNVD: CNVD-2017-01889
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-113376
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2017-5173
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4 // CNVD: CNVD-2017-01889 // VULHUB: VHN-113376 // VULMON: CVE-2017-5173 // JVNDB: JVNDB-2017-004263 // NVD: CVE-2017-5173 // CNNVD: CNNVD-201702-611

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-943

Trust: 0.8

sources: JVNDB: JVNDB-2017-004263 // NVD: CVE-2017-5173

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-611

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201702-611

CONFIGURATIONS

sources: NVD: CVE-2017-5173

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-113376 // VULMON: CVE-2017-5173

PATCH

title:Top Pageurl:https://www.geutebrueck.com/en_en.html

Trust: 0.8

title:Patch for Geutebruck G-Cam/EFD-2250 Remote Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/89709

Trust: 0.6

title:Geutebrück G-Cam/EFD-2250 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68204

Trust: 0.6

sources: CNVD: CNVD-2017-01889 // JVNDB: JVNDB-2017-004263 // CNNVD: CNNVD-201702-611

EXTERNAL IDS

db:NVDid:CVE-2017-5173

Trust: 3.7

db:ICS CERTid:ICSA-17-045-02

Trust: 2.9

db:BIDid:96209

Trust: 2.7

db:EXPLOIT-DBid:41360

Trust: 1.8

db:CNNVDid:CNNVD-201702-611

Trust: 0.9

db:CNVDid:CNVD-2017-01889

Trust: 0.8

db:JVNDBid:JVNDB-2017-004263

Trust: 0.8

db:IVDid:05EBD79B-F06D-41C7-986C-D7D4284611B4

Trust: 0.2

db:PACKETSTORMid:141142

Trust: 0.1

db:VULHUBid:VHN-113376

Trust: 0.1

db:VULMONid:CVE-2017-5173

Trust: 0.1

sources: IVD: 05ebd79b-f06d-41c7-986c-d7d4284611b4 // CNVD: CNVD-2017-01889 // VULHUB: VHN-113376 // VULMON: CVE-2017-5173 // BID: 96209 // JVNDB: JVNDB-2017-004263 // NVD: CVE-2017-5173 // CNNVD: CNNVD-201702-611

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-045-02

Trust: 2.7

url:http://www.securityfocus.com/bid/96209

Trust: 2.4

url:https://www.exploit-db.com/exploits/41360/

Trust: 1.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5173

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-5173

Trust: 0.8

url:http://www.geutebrueck.com/en_en/product-overview-31934.html

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-045-02

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/943.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=52662

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2017-01889 // VULHUB: VHN-113376 // VULMON: CVE-2017-5173 // BID: 96209 // JVNDB: JVNDB-2017-004263 // NVD: CVE-2017-5173 // CNNVD: CNNVD-201702-611

CREDITS

Florent Montel, Frederic Cikala, and Davy Douhine of RandoriSec

Trust: 0.3

sources: BID: 96209

SOURCES

db:IVDid:05ebd79b-f06d-41c7-986c-d7d4284611b4
db:CNVDid:CNVD-2017-01889
db:VULHUBid:VHN-113376
db:VULMONid:CVE-2017-5173
db:BIDid:96209
db:JVNDBid:JVNDB-2017-004263
db:NVDid:CVE-2017-5173
db:CNNVDid:CNNVD-201702-611

LAST UPDATE DATE

2023-12-18T12:44:37.070000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-01889date:2017-02-24T00:00:00
db:VULHUBid:VHN-113376date:2017-09-01T00:00:00
db:VULMONid:CVE-2017-5173date:2017-09-01T00:00:00
db:BIDid:96209date:2017-03-07T04:02:00
db:JVNDBid:JVNDB-2017-004263date:2017-06-21T00:00:00
db:NVDid:CVE-2017-5173date:2022-02-10T17:58:18.437
db:CNNVDid:CNNVD-201702-611date:2022-02-11T00:00:00

SOURCES RELEASE DATE

db:IVDid:05ebd79b-f06d-41c7-986c-d7d4284611b4date:2017-02-24T00:00:00
db:CNVDid:CNVD-2017-01889date:2017-02-24T00:00:00
db:VULHUBid:VHN-113376date:2017-05-19T00:00:00
db:VULMONid:CVE-2017-5173date:2017-05-19T00:00:00
db:BIDid:96209date:2017-02-14T00:00:00
db:JVNDBid:JVNDB-2017-004263date:2017-06-21T00:00:00
db:NVDid:CVE-2017-5173date:2017-05-19T03:29:00.183
db:CNNVDid:CNNVD-201702-611date:2017-02-20T00:00:00