ID

VAR-201708-1408


CVE

CVE-2017-9661


TITLE

SIMPlight SCADA Software DLL Load Local Code Execution Vulnerability

Trust: 0.8

sources: IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff // CNVD: CNVD-2017-22811

DESCRIPTION

An Uncontrolled Search Path Element issue was discovered in SIMPlight SCADA Software version 4.3.0.27 and prior. The uncontrolled search path element vulnerability has been identified, which may allow an attacker to place a malicious DLL file within the search path resulting in execution of arbitrary code. SIMPlight SCADA The software contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SIMPlight SCADA is a building management system and automation equipment software. SIMPlight SCADA Software is prone to a local arbitrary code-execution vulnerability because it fails to sanitize user-supplied input. A local attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. SIMPlight SCADA Software 4.3.0.27 and prior versions are vulnerable

Trust: 2.61

sources: NVD: CVE-2017-9661 // JVNDB: JVNDB-2017-007181 // CNVD: CNVD-2017-22811 // BID: 100263 // IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff // CNVD: CNVD-2017-22811

AFFECTED PRODUCTS

vendor:simplightmodel:scadascope:lteversion:4.3.0.27

Trust: 1.8

vendor:simplightmodel:scada softwarescope:lteversion:<=4.3.0.27

Trust: 0.6

vendor:simplightmodel:scadascope:eqversion:4.3.0.27

Trust: 0.6

vendor:simplightmodel:scada softwarescope:eqversion:4.3.0.27

Trust: 0.3

vendor:scadamodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff // CNVD: CNVD-2017-22811 // BID: 100263 // JVNDB: JVNDB-2017-007181 // CNNVD: CNNVD-201706-576 // NVD: CVE-2017-9661

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9661
value: HIGH

Trust: 1.0

NVD: CVE-2017-9661
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-22811
value: LOW

Trust: 0.6

CNNVD: CNNVD-201706-576
value: MEDIUM

Trust: 0.6

IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2017-9661
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-22811
severity: LOW
baseScore: 3.7
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 1.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff
severity: LOW
baseScore: 3.7
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 1.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-9661
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff // CNVD: CNVD-2017-22811 // JVNDB: JVNDB-2017-007181 // CNNVD: CNNVD-201706-576 // NVD: CVE-2017-9661

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.8

sources: JVNDB: JVNDB-2017-007181 // NVD: CVE-2017-9661

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-576

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201706-576

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007181

PATCH

title:Top Pageurl:https://simplight.ru/

Trust: 0.8

title:SIMPlight SCADA Software DLL loads patches for native code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/100824

Trust: 0.6

sources: CNVD: CNVD-2017-22811 // JVNDB: JVNDB-2017-007181

EXTERNAL IDS

db:NVDid:CVE-2017-9661

Trust: 3.5

db:ICS CERTid:ICSA-17-222-01

Trust: 3.3

db:BIDid:100263

Trust: 1.9

db:CNVDid:CNVD-2017-22811

Trust: 0.8

db:CNNVDid:CNNVD-201706-576

Trust: 0.8

db:JVNDBid:JVNDB-2017-007181

Trust: 0.8

db:NSFOCUSid:37418

Trust: 0.6

db:IVDid:3E61F582-EA7A-474A-A72F-C8EC0D1BD8FF

Trust: 0.2

sources: IVD: 3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff // CNVD: CNVD-2017-22811 // BID: 100263 // JVNDB: JVNDB-2017-007181 // CNNVD: CNNVD-201706-576 // NVD: CVE-2017-9661

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-222-01

Trust: 3.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-9661

Trust: 1.4

url:http://www.securityfocus.com/bid/100263

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9661

Trust: 0.8

url:http://www.nsfocus.net/vulndb/37418

Trust: 0.6

url:https://simplight.ru

Trust: 0.3

sources: CNVD: CNVD-2017-22811 // BID: 100263 // JVNDB: JVNDB-2017-007181 // CNNVD: CNNVD-201706-576 // NVD: CVE-2017-9661

CREDITS

Karn Ganeshen

Trust: 0.3

sources: BID: 100263

SOURCES

db:IVDid:3e61f582-ea7a-474a-a72f-c8ec0d1bd8ff
db:CNVDid:CNVD-2017-22811
db:BIDid:100263
db:JVNDBid:JVNDB-2017-007181
db:CNNVDid:CNNVD-201706-576
db:NVDid:CVE-2017-9661

LAST UPDATE DATE

2025-04-20T23:32:51.055000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-22811date:2017-08-25T00:00:00
db:BIDid:100263date:2017-08-10T00:00:00
db:JVNDBid:JVNDB-2017-007181date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201706-576date:2017-08-15T00:00:00
db:NVDid:CVE-2017-9661date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:3e61f582-ea7a-474a-a72f-c8ec0d1bd8ffdate:2017-08-25T00:00:00
db:CNVDid:CNVD-2017-22811date:2017-08-25T00:00:00
db:BIDid:100263date:2017-08-10T00:00:00
db:JVNDBid:JVNDB-2017-007181date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201706-576date:2017-06-15T00:00:00
db:NVDid:CVE-2017-9661date:2017-08-14T16:29:00.380