ID

VAR-201705-3541


CVE

CVE-2017-6031


TITLE

Certec EDV GmbH atvise scada Cross-Site Scripting Vulnerability

Trust: 0.8

sources: IVD: a456d664-dbbf-4220-9678-1f6468d79b5c // CNVD: CNVD-2017-04453

DESCRIPTION

A Header Injection issue was discovered in Certec EDV GmbH atvise scada prior to Version 3.0. An "improper neutralization of HTTP headers for scripting syntax" issue has been identified, which may allow remote code execution. Certec EDV GmbH atvise scada Contains an injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Certec EDV GmbH is headquartered in Austria. Atvise is a network-based human-machine interface monitoring and data acquisition system. Cross-site scripting vulnerability exists at Certec EDV GmbH atvise scada. An attacker could exploit this vulnerability to execute arbitrary script code in the browser of an uninformed user of the affected site context. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks and to insert a crafted HTTP header into an HTTP response that could cause web server cache poisoning. These issues may aid in further attacks. Versions prior to atvise 3.1 are vulnerable

Trust: 2.61

sources: NVD: CVE-2017-6031 // JVNDB: JVNDB-2017-003936 // CNVD: CNVD-2017-04453 // BID: 97479 // IVD: a456d664-dbbf-4220-9678-1f6468d79b5c

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: a456d664-dbbf-4220-9678-1f6468d79b5c // CNVD: CNVD-2017-04453

AFFECTED PRODUCTS

vendor:certec edvmodel:atvise scadascope:lteversion:2.5.10

Trust: 1.0

vendor:certec edvmodel:atvisescope:eqversion:3.0

Trust: 0.9

vendor:certec edvmodel:atvise scadascope:ltversion:3.0

Trust: 0.8

vendor:atvisemodel:atvisescope:eqversion:0

Trust: 0.6

vendor:certec edvmodel:atvisescope:ltversion:3.1

Trust: 0.6

vendor:certec edvmodel:atvise scadascope:eqversion:2.5.10

Trust: 0.6

vendor:certec edvmodel:atvisescope:neversion:3.1

Trust: 0.3

vendor:atvise scadamodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: a456d664-dbbf-4220-9678-1f6468d79b5c // CNVD: CNVD-2017-04453 // BID: 97479 // JVNDB: JVNDB-2017-003936 // CNNVD: CNNVD-201702-581 // NVD: CVE-2017-6031

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6031
value: HIGH

Trust: 1.0

NVD: CVE-2017-6031
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-04453
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201702-581
value: HIGH

Trust: 0.6

IVD: a456d664-dbbf-4220-9678-1f6468d79b5c
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2017-6031
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-04453
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: a456d664-dbbf-4220-9678-1f6468d79b5c
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-6031
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: a456d664-dbbf-4220-9678-1f6468d79b5c // CNVD: CNVD-2017-04453 // JVNDB: JVNDB-2017-003936 // CNNVD: CNNVD-201702-581 // NVD: CVE-2017-6031

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.8

problemtype:CWE-644

Trust: 1.0

sources: JVNDB: JVNDB-2017-003936 // NVD: CVE-2017-6031

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-581

TYPE

injection

Trust: 0.8

sources: IVD: a456d664-dbbf-4220-9678-1f6468d79b5c // CNNVD: CNNVD-201702-581

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003936

PATCH

title:atvise scadaurl:http://www.atvise.com/en/products-solutions/atvise-scada

Trust: 0.8

title:Patch of Certec EDV GmbH atvise scada cross-site scripting vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/91819

Trust: 0.6

title:Certec EDV GmbH atvise scada Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99640

Trust: 0.6

sources: CNVD: CNVD-2017-04453 // JVNDB: JVNDB-2017-003936 // CNNVD: CNNVD-201702-581

EXTERNAL IDS

db:NVDid:CVE-2017-6031

Trust: 3.5

db:BIDid:97479

Trust: 2.5

db:ICS CERTid:ICSA-17-096-01A

Trust: 2.4

db:CNVDid:CNVD-2017-04453

Trust: 0.8

db:CNNVDid:CNNVD-201702-581

Trust: 0.8

db:JVNDBid:JVNDB-2017-003936

Trust: 0.8

db:ICS CERTid:ICSA-17-096-01

Trust: 0.3

db:IVDid:A456D664-DBBF-4220-9678-1F6468D79B5C

Trust: 0.2

sources: IVD: a456d664-dbbf-4220-9678-1f6468d79b5c // CNVD: CNVD-2017-04453 // BID: 97479 // JVNDB: JVNDB-2017-003936 // CNNVD: CNNVD-201702-581 // NVD: CVE-2017-6031

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-096-01a

Trust: 2.4

url:http://www.securityfocus.com/bid/97479

Trust: 2.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6031

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6031

Trust: 0.8

url:http://www.atvise.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-096-01

Trust: 0.3

sources: CNVD: CNVD-2017-04453 // BID: 97479 // JVNDB: JVNDB-2017-003936 // CNNVD: CNNVD-201702-581 // NVD: CVE-2017-6031

CREDITS

Sebastian Neef of Internetwache.org

Trust: 0.3

sources: BID: 97479

SOURCES

db:IVDid:a456d664-dbbf-4220-9678-1f6468d79b5c
db:CNVDid:CNVD-2017-04453
db:BIDid:97479
db:JVNDBid:JVNDB-2017-003936
db:CNNVDid:CNNVD-201702-581
db:NVDid:CVE-2017-6031

LAST UPDATE DATE

2025-04-20T23:34:25.991000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-04453date:2017-06-06T00:00:00
db:BIDid:97479date:2017-04-11T00:03:00
db:JVNDBid:JVNDB-2017-003936date:2017-06-12T00:00:00
db:CNNVDid:CNNVD-201702-581date:2019-10-17T00:00:00
db:NVDid:CVE-2017-6031date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:a456d664-dbbf-4220-9678-1f6468d79b5cdate:2017-04-14T00:00:00
db:CNVDid:CNVD-2017-04453date:2017-04-14T00:00:00
db:BIDid:97479date:2017-04-06T00:00:00
db:JVNDBid:JVNDB-2017-003936date:2017-06-12T00:00:00
db:CNNVDid:CNNVD-201702-581date:2017-02-17T00:00:00
db:NVDid:CVE-2017-6031date:2017-05-06T00:29:00.240