ID

VAR-201705-3756


CVE

CVE-2017-7909


TITLE

Advantech B + B SmartWorx MESR901 Authentication Bypass Vulnerability

Trust: 0.8

sources: IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4 // CNVD: CNVD-2017-07166

DESCRIPTION

A Use of Client-Side Authentication issue was discovered in Advantech B+B SmartWorx MESR901 firmware versions 1.5.2 and prior. The web interface uses JavaScript to check client authentication and redirect unauthorized users. Attackers may intercept requests and bypass authentication to access restricted web pages. Advantech B+B SmartWorx MESR901 There are authentication vulnerabilities in the firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Advantech B + B SmartWorx MESR901 is a Modbus gateway. Advantech B + B SmartWorx MESR901 has an authentication bypass vulnerability. An attacker could exploit the vulnerability for authentication and perform unauthorized operations, leading to further attacks. Advantech B+B SmartWorx MESR901 is prone to an authentication-bypass vulnerability. This may lead to further attacks. MESR901 1.5.2 and prior are vulnerable. Advantech B+B SmartWorx MESR901 is a serial gateway device of China Advantech Company. A security vulnerability exists in Advantech B+B SmartWorx MESR901 firmware 1.5.2 and earlier

Trust: 2.7

sources: NVD: CVE-2017-7909 // JVNDB: JVNDB-2017-003930 // CNVD: CNVD-2017-07166 // BID: 98257 // IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4 // VULHUB: VHN-116112

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4 // CNVD: CNVD-2017-07166

AFFECTED PRODUCTS

vendor:advantech b b smartworxmodel:mesr901scope:lteversion:1.5.2

Trust: 1.0

vendor:advantechmodel:mesr901scope:lteversion:1.5.2

Trust: 0.8

vendor:advantechmodel:b+b smartworx mesr901scope:lteversion:<=1.5.2

Trust: 0.6

vendor:advantech b b smartworxmodel:mesr901scope:eqversion:1.5.2

Trust: 0.6

vendor:advantechmodel:b+b smartworx mesr901scope:eqversion:1.5.2

Trust: 0.3

vendor:advantechmodel:b+b smartworx mesr901scope:eqversion:1.5

Trust: 0.3

vendor:advantechmodel:b+b smartworx mesr901scope:eqversion:1.0.1

Trust: 0.3

vendor:mesr901model: - scope:eqversion:*

Trust: 0.2

sources: IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4 // CNVD: CNVD-2017-07166 // BID: 98257 // JVNDB: JVNDB-2017-003930 // CNNVD: CNNVD-201705-226 // NVD: CVE-2017-7909

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7909
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-7909
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-07166
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201705-226
value: CRITICAL

Trust: 0.6

IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4
value: CRITICAL

Trust: 0.2

VULHUB: VHN-116112
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-7909
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-07166
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-116112
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7909
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4 // CNVD: CNVD-2017-07166 // VULHUB: VHN-116112 // JVNDB: JVNDB-2017-003930 // CNNVD: CNNVD-201705-226 // NVD: CVE-2017-7909

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

problemtype:CWE-603

Trust: 1.0

sources: VULHUB: VHN-116112 // JVNDB: JVNDB-2017-003930 // NVD: CVE-2017-7909

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-226

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201705-226

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003930

PATCH

title:Top Pageurl:http://www.bb-elec.com/Home.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2017-003930

EXTERNAL IDS

db:NVDid:CVE-2017-7909

Trust: 3.6

db:ICS CERTid:ICSA-17-122-03

Trust: 2.8

db:BIDid:98257

Trust: 2.6

db:CNNVDid:CNNVD-201705-226

Trust: 0.9

db:CNVDid:CNVD-2017-07166

Trust: 0.8

db:JVNDBid:JVNDB-2017-003930

Trust: 0.8

db:IVDid:6E1BEE5A-97C1-4A54-AD2F-BA40FB43F9D4

Trust: 0.2

db:VULHUBid:VHN-116112

Trust: 0.1

sources: IVD: 6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4 // CNVD: CNVD-2017-07166 // VULHUB: VHN-116112 // BID: 98257 // JVNDB: JVNDB-2017-003930 // CNNVD: CNNVD-201705-226 // NVD: CVE-2017-7909

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-122-03

Trust: 2.8

url:http://www.securityfocus.com/bid/98257

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-7909

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7909

Trust: 0.8

url:http://advantech-bb.com/

Trust: 0.3

url:http://www.bb-elec.com/products/ethernet-serial-servers-gateways/modbus-gateways-and-protocol-converters/mesr900-modbus-protocol-converters/mesr901.aspx

Trust: 0.3

sources: CNVD: CNVD-2017-07166 // VULHUB: VHN-116112 // BID: 98257 // JVNDB: JVNDB-2017-003930 // CNNVD: CNNVD-201705-226 // NVD: CVE-2017-7909

CREDITS

Maxim Rupp

Trust: 0.9

sources: BID: 98257 // CNNVD: CNNVD-201705-226

SOURCES

db:IVDid:6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4
db:CNVDid:CNVD-2017-07166
db:VULHUBid:VHN-116112
db:BIDid:98257
db:JVNDBid:JVNDB-2017-003930
db:CNNVDid:CNNVD-201705-226
db:NVDid:CVE-2017-7909

LAST UPDATE DATE

2025-04-20T23:38:30.949000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-07166date:2017-05-22T00:00:00
db:VULHUBid:VHN-116112date:2019-10-09T00:00:00
db:BIDid:98257date:2017-05-18T16:17:00
db:JVNDBid:JVNDB-2017-003930date:2017-06-12T00:00:00
db:CNNVDid:CNNVD-201705-226date:2019-10-17T00:00:00
db:NVDid:CVE-2017-7909date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:6e1bee5a-97c1-4a54-ad2f-ba40fb43f9d4date:2017-05-22T00:00:00
db:CNVDid:CNVD-2017-07166date:2017-05-22T00:00:00
db:VULHUBid:VHN-116112date:2017-05-06T00:00:00
db:BIDid:98257date:2017-05-02T00:00:00
db:JVNDBid:JVNDB-2017-003930date:2017-06-12T00:00:00
db:CNNVDid:CNNVD-201705-226date:2017-05-04T00:00:00
db:NVDid:CVE-2017-7909date:2017-05-06T00:29:00.273