ID

VAR-201706-0656


CVE

CVE-2017-7901


TITLE

plural Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 Vulnerability related to insufficient random value in controller

Trust: 0.8

sources: JVNDB: JVNDB-2017-005285

DESCRIPTION

A Predictable Value Range from Previous Values issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. Insufficiently random TCP initial sequence numbers are generated, which may allow an attacker to predict the numbers from previous values. This may allow an attacker to spoof or disrupt TCP connections, resulting in a denial of service for the target device. plural Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 The controller contains a vulnerability related to the use of insufficient random values.By the attacker, TCP Impaired service operation by spoofing or interrupting connection (DoS) There is a possibility of being put into a state. Rockwell Automation Allen-Bradley MicroLogix 1100 1763-L16AWA Series A is a programmable logic controller (PLC) product from Rockwell Automation. An attacker could exploit the vulnerability to cause a denial of service. Attackers may exploit these issues to bypass authentication mechanism, bypass security restrictions and perform unauthorized actions, gain sensitive information and cause denial-of-service conditions

Trust: 2.7

sources: NVD: CVE-2017-7901 // JVNDB: JVNDB-2017-005285 // CNVD: CNVD-2017-08714 // BID: 98630 // IVD: 5fd06eb4-267d-4a08-8ef1-7a61d9396f11 // VULHUB: VHN-116104

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5fd06eb4-267d-4a08-8ef1-7a61d9396f11 // CNVD: CNVD-2017-08714

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:1763-l16dwd series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwa series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awa series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwa series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxb series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwaa series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16awa series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxba series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxb series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwaa series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awaa series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16dwd series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awa series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awaa series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16awa series bscope:lteversion:16.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxba series ascope:lteversion:16.000

Trust: 1.0

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16awa series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16awa series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bbb series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bbb series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bwa series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bwa series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16dwd series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16dwd series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awa series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awa series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awaa series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awaa series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwa series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwa series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwaa series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwaa series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxb series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxb series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxba series ascope:lteversion:16.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxba series bscope:lteversion:16.000

Trust: 0.8

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awascope:eqversion:1100<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbbscope:eqversion:1100<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwascope:eqversion:1100<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwdscope:eqversion:1100<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awascope:eqversion:1400<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwascope:eqversion:1400<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaascope:eqversion:1400<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxbscope:eqversion:1400<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxbascope:eqversion:1400<=16.00

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaascope:eqversion:1400<=16.00

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bwaa series bscope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16dwd series bscope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxb series bscope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32awa series bscope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bwa series bscope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bwaa series ascope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bwa series ascope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16bwa series ascope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32awa series ascope:eqversion:16.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxb series ascope:eqversion:16.000

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series bscope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series ascope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series bscope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series ascope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series bscope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series ascope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series bscope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series ascope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series bscope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series ascope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series bscope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series ascope:eqversion:140016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series bscope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series ascope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series bscope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series ascope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series bscope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series ascope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series bscope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series ascope:eqversion:110016.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series bscope:neversion:140021.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series bscope:neversion:140021.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series bscope:neversion:140021.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series bscope:neversion:140021.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series bscope:neversion:140021.00

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series bscope:neversion:140021.00

Trust: 0.3

vendor:1763 l16awa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16awa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bbb series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bbb series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bwa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bwa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16dwd series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16dwd series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awaa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awaa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwaa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwaa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxb series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxb series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxba series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxba series bmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 5fd06eb4-267d-4a08-8ef1-7a61d9396f11 // CNVD: CNVD-2017-08714 // BID: 98630 // JVNDB: JVNDB-2017-005285 // CNNVD: CNNVD-201705-1232 // NVD: CVE-2017-7901

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7901
value: HIGH

Trust: 1.0

NVD: CVE-2017-7901
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-08714
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201705-1232
value: CRITICAL

Trust: 0.6

IVD: 5fd06eb4-267d-4a08-8ef1-7a61d9396f11
value: CRITICAL

Trust: 0.2

VULHUB: VHN-116104
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-7901
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-08714
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5fd06eb4-267d-4a08-8ef1-7a61d9396f11
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-116104
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7901
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.7
version: 3.0

Trust: 1.8

sources: IVD: 5fd06eb4-267d-4a08-8ef1-7a61d9396f11 // CNVD: CNVD-2017-08714 // VULHUB: VHN-116104 // JVNDB: JVNDB-2017-005285 // CNNVD: CNNVD-201705-1232 // NVD: CVE-2017-7901

PROBLEMTYPE DATA

problemtype:CWE-330

Trust: 1.9

problemtype:CWE-343

Trust: 1.0

sources: VULHUB: VHN-116104 // JVNDB: JVNDB-2017-005285 // NVD: CVE-2017-7901

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-1232

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201705-1232

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005285

PATCH

title:MicroLogix 1100コントローラurl:http://ab.rockwellautomation.com/ja/Programmable-Controllers/MicroLogix-1100

Trust: 0.8

title:MicroLogix 1400コントローラurl:http://ab.rockwellautomation.com/ja/Programmable-Controllers/MicroLogix-1400

Trust: 0.8

title:A number of Rockwell Automation products have unexplained patches (CNVD-2017-08714)url:https://www.cnvd.org.cn/patchInfo/show/94977

Trust: 0.6

title:Multiple Rockwell Automation Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70551

Trust: 0.6

sources: CNVD: CNVD-2017-08714 // JVNDB: JVNDB-2017-005285 // CNNVD: CNNVD-201705-1232

EXTERNAL IDS

db:NVDid:CVE-2017-7901

Trust: 3.6

db:ICS CERTid:ICSA-17-115-04

Trust: 2.8

db:BIDid:98630

Trust: 1.5

db:SECTRACKid:1038546

Trust: 1.1

db:CNNVDid:CNNVD-201705-1232

Trust: 0.9

db:CNVDid:CNVD-2017-08714

Trust: 0.8

db:JVNDBid:JVNDB-2017-005285

Trust: 0.8

db:NSFOCUSid:36798

Trust: 0.6

db:IVDid:5FD06EB4-267D-4A08-8EF1-7A61D9396F11

Trust: 0.2

db:VULHUBid:VHN-116104

Trust: 0.1

sources: IVD: 5fd06eb4-267d-4a08-8ef1-7a61d9396f11 // CNVD: CNVD-2017-08714 // VULHUB: VHN-116104 // BID: 98630 // JVNDB: JVNDB-2017-005285 // CNNVD: CNNVD-201705-1232 // NVD: CVE-2017-7901

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-115-04

Trust: 2.8

url:http://www.securityfocus.com/bid/98630

Trust: 1.2

url:http://www.securitytracker.com/id/1038546

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7901

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7901

Trust: 0.8

url:http://www.nsfocus.net/vulndb/36798

Trust: 0.6

url:http://www.moxa.com/

Trust: 0.3

sources: CNVD: CNVD-2017-08714 // VULHUB: VHN-116104 // BID: 98630 // JVNDB: JVNDB-2017-005285 // CNNVD: CNNVD-201705-1232 // NVD: CVE-2017-7901

CREDITS

Maxim Rupp

Trust: 0.9

sources: BID: 98630 // CNNVD: CNNVD-201705-1232

SOURCES

db:IVDid:5fd06eb4-267d-4a08-8ef1-7a61d9396f11
db:CNVDid:CNVD-2017-08714
db:VULHUBid:VHN-116104
db:BIDid:98630
db:JVNDBid:JVNDB-2017-005285
db:CNNVDid:CNNVD-201705-1232
db:NVDid:CVE-2017-7901

LAST UPDATE DATE

2025-04-20T23:26:04.381000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-08714date:2017-06-08T00:00:00
db:VULHUBid:VHN-116104date:2017-07-08T00:00:00
db:BIDid:98630date:2017-05-23T00:00:00
db:JVNDBid:JVNDB-2017-005285date:2017-07-25T00:00:00
db:CNNVDid:CNNVD-201705-1232date:2017-07-03T00:00:00
db:NVDid:CVE-2017-7901date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:5fd06eb4-267d-4a08-8ef1-7a61d9396f11date:2017-06-08T00:00:00
db:CNVDid:CNVD-2017-08714date:2017-06-08T00:00:00
db:VULHUBid:VHN-116104date:2017-06-30T00:00:00
db:BIDid:98630date:2017-05-23T00:00:00
db:JVNDBid:JVNDB-2017-005285date:2017-07-25T00:00:00
db:CNNVDid:CNNVD-201705-1232date:2017-05-23T00:00:00
db:NVDid:CVE-2017-7901date:2017-06-30T03:29:00.797