ID

VAR-201711-0030


CVE

CVE-2017-10890


TITLE

Robotic appliance COCOROBO vulnerable to session management

Trust: 0.8

sources: JVNDB: JVNDB-2017-000238

DESCRIPTION

Session management issue in RX-V200 firmware versions prior to 09.87.17.09, RX-V100 firmware versions prior to 03.29.17.09, RX-CLV1-P firmware versions prior to 79.17.17.09, RX-CLV2-B firmware versions prior to 89.07.17.09, RX-CLV3-N firmware versions prior to 91.09.17.10 allows an attacker on the same LAN to perform arbitrary operations or access information via unspecified vectors. Robotic appliance COCOROBO provided by Sharp Corporation is a robot with cleaning function. Robotic appliance COCOROBO contains a vulnerability in session management (CWE-639). Kiyotaka ATSUMI of IoT Technology Laboratory, Cyber Grid Japan, LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker on the same LAN may impersonate a user to accessing product. As a result, there is a possibility that an arbitrary operation may be conducted or information may be altered/disclosed

Trust: 2.16

sources: NVD: CVE-2017-10890 // JVNDB: JVNDB-2017-000238 // CNVD: CNVD-2017-37261

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-37261

AFFECTED PRODUCTS

vendor:sharpmodel:rx-v200scope:ltversion:09.87.17.09

Trust: 1.6

vendor:sharpmodel:rx-v100scope:ltversion:03.29.17.09

Trust: 1.6

vendor:sharpmodel:rx-clv1-pscope:ltversion:79.17.17.09

Trust: 1.6

vendor:sharpmodel:rx-clv2-bscope:ltversion:89.07.17.09

Trust: 1.6

vendor:sharpmodel:rx-clv3-nscope:ltversion:91.09.17.10

Trust: 1.6

vendor:sharpmodel:rx-clv1-pscope:eqversion:prior to 79.17.17.09

Trust: 0.8

vendor:sharpmodel:rx-clv2-bscope:eqversion:prior to 89.07.17.09

Trust: 0.8

vendor:sharpmodel:rx-clv3-nscope:eqversion:prior to 91.09.17.10

Trust: 0.8

vendor:sharpmodel:rx-v100scope:eqversion:prior to 03.29.17.09

Trust: 0.8

vendor:sharpmodel:rx-v200scope:eqversion:prior to 09.87.17.09

Trust: 0.8

sources: CNVD: CNVD-2017-37261 // JVNDB: JVNDB-2017-000238 // NVD: CVE-2017-10890

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-10890
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2017-000238
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-37261
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201711-726
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2017-10890
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2017-000238
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2017-37261
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-10890
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 2.5
version: 3.0

Trust: 1.0

IPA: JVNDB-2017-000238
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-37261 // JVNDB: JVNDB-2017-000238 // CNNVD: CNNVD-201711-726 // NVD: CVE-2017-10890

PROBLEMTYPE DATA

problemtype:CWE-384

Trust: 1.0

problemtype:CWE-264

Trust: 0.8

sources: JVNDB: JVNDB-2017-000238 // NVD: CVE-2017-10890

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201711-726

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201711-726

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-000238

PATCH

title:Sharp Corporation websiteurl:http://www.sharp.co.jp/cocorobo/manual/firmware.html

Trust: 0.8

title:Patch for RoboticapplianceCOCOROBO Session Management Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/110825

Trust: 0.6

title:Multiple Robotic appliance COCOROBO Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76534

Trust: 0.6

sources: CNVD: CNVD-2017-37261 // JVNDB: JVNDB-2017-000238 // CNNVD: CNNVD-201711-726

EXTERNAL IDS

db:JVNid:JVN76382932

Trust: 3.0

db:NVDid:CVE-2017-10890

Trust: 3.0

db:JVNDBid:JVNDB-2017-000238

Trust: 0.8

db:CNVDid:CNVD-2017-37261

Trust: 0.6

db:CNNVDid:CNNVD-201711-726

Trust: 0.6

sources: CNVD: CNVD-2017-37261 // JVNDB: JVNDB-2017-000238 // CNNVD: CNNVD-201711-726 // NVD: CVE-2017-10890

REFERENCES

url:https://jvn.jp/en/jp/jvn76382932/index.html

Trust: 2.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10890

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-10890

Trust: 0.8

url:http://jvn.jp/en/jp/jvn76382932/

Trust: 0.6

sources: CNVD: CNVD-2017-37261 // JVNDB: JVNDB-2017-000238 // CNNVD: CNNVD-201711-726 // NVD: CVE-2017-10890

SOURCES

db:CNVDid:CNVD-2017-37261
db:JVNDBid:JVNDB-2017-000238
db:CNNVDid:CNNVD-201711-726
db:NVDid:CVE-2017-10890

LAST UPDATE DATE

2025-04-20T23:35:41.030000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-37261date:2017-12-18T00:00:00
db:JVNDBid:JVNDB-2017-000238date:2018-03-14T00:00:00
db:CNNVDid:CNNVD-201711-726date:2017-11-22T00:00:00
db:NVDid:CVE-2017-10890date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-37261date:2017-12-18T00:00:00
db:JVNDBid:JVNDB-2017-000238date:2017-11-16T00:00:00
db:CNNVDid:CNNVD-201711-726date:2017-11-22T00:00:00
db:NVDid:CVE-2017-10890date:2017-11-17T14:29:00.403