ID

VAR-201712-0527


CVE

CVE-2017-17878


TITLE

Valve Steam Link Vulnerabilities in the use of cryptographic algorithms

Trust: 0.8

sources: JVNDB: JVNDB-2017-011789

DESCRIPTION

An issue was discovered in Valve Steam Link build 643. Root passwords longer than 8 characters are truncated because of the default use of DES (aka the CONFIG_FEATURE_DEFAULT_PASSWD_ALGO="des" setting). Valve Steam Link Contains a vulnerability in the use of cryptographic algorithms.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ValveSteamLink is a Steam online gaming device from ValueSoftware, USA. A security vulnerability exists in the ValveSteamLinkbuild643 version, which stems from the fact that the program only detects the first 8 characters of the password. There are currently no detailed details of the vulnerability provided

Trust: 2.34

sources: NVD: CVE-2017-17878 // JVNDB: JVNDB-2017-011789 // CNVD: CNVD-2018-01479 // VULHUB: VHN-108944 // VULMON: CVE-2017-17878

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-01479

AFFECTED PRODUCTS

vendor:valvesoftwaremodel:steam linkscope:ltversion:644

Trust: 1.0

vendor:valvemodel:steam linkscope:eqversion:build 643

Trust: 0.8

vendor:valuemodel:software steam link buildscope:eqversion:643

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:637

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:639

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:617

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:626

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:624

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:628

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:640

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:630

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:620

Trust: 0.6

vendor:valvesoftwaremodel:steam linkscope:eqversion:623

Trust: 0.6

sources: CNVD: CNVD-2018-01479 // JVNDB: JVNDB-2017-011789 // CNNVD: CNNVD-201712-1005 // NVD: CVE-2017-17878

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-17878
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-17878
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-01479
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201712-1005
value: CRITICAL

Trust: 0.6

VULHUB: VHN-108944
value: HIGH

Trust: 0.1

VULMON: CVE-2017-17878
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-17878
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-01479
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-108944
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-17878
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-01479 // VULHUB: VHN-108944 // VULMON: CVE-2017-17878 // JVNDB: JVNDB-2017-011789 // CNNVD: CNNVD-201712-1005 // NVD: CVE-2017-17878

PROBLEMTYPE DATA

problemtype:CWE-327

Trust: 1.9

sources: VULHUB: VHN-108944 // JVNDB: JVNDB-2017-011789 // NVD: CVE-2017-17878

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-1005

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201712-1005

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011789

PATCH

title:Default root password is not steamlink123 #101url:https://github.com/ValveSoftware/steamlink-sdk/issues/101

Trust: 0.8

title:Only first 8 characters of password are checked #110url:https://github.com/ValveSoftware/steamlink-sdk/issues/110

Trust: 0.8

sources: JVNDB: JVNDB-2017-011789

EXTERNAL IDS

db:NVDid:CVE-2017-17878

Trust: 3.2

db:JVNDBid:JVNDB-2017-011789

Trust: 0.8

db:CNVDid:CNVD-2018-01479

Trust: 0.6

db:CNNVDid:CNNVD-201712-1005

Trust: 0.6

db:VULHUBid:VHN-108944

Trust: 0.1

db:VULMONid:CVE-2017-17878

Trust: 0.1

sources: CNVD: CNVD-2018-01479 // VULHUB: VHN-108944 // VULMON: CVE-2017-17878 // JVNDB: JVNDB-2017-011789 // CNNVD: CNNVD-201712-1005 // NVD: CVE-2017-17878

REFERENCES

url:https://blogger.davidmanouchehri.com/2017/12/steam-link-security-truncated-password.html

Trust: 2.4

url:https://github.com/valvesoftware/steamlink-sdk/issues/101

Trust: 1.8

url:https://github.com/valvesoftware/steamlink-sdk/issues/110

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17878

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-17878

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/327.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-01479 // VULHUB: VHN-108944 // VULMON: CVE-2017-17878 // JVNDB: JVNDB-2017-011789 // CNNVD: CNNVD-201712-1005 // NVD: CVE-2017-17878

SOURCES

db:CNVDid:CNVD-2018-01479
db:VULHUBid:VHN-108944
db:VULMONid:CVE-2017-17878
db:JVNDBid:JVNDB-2017-011789
db:CNNVDid:CNNVD-201712-1005
db:NVDid:CVE-2017-17878

LAST UPDATE DATE

2025-04-20T23:37:45.779000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-01479date:2018-01-19T00:00:00
db:VULHUBid:VHN-108944date:2018-01-11T00:00:00
db:VULMONid:CVE-2017-17878date:2018-01-11T00:00:00
db:JVNDBid:JVNDB-2017-011789date:2018-01-26T00:00:00
db:CNNVDid:CNNVD-201712-1005date:2020-07-22T00:00:00
db:NVDid:CVE-2017-17878date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-01479date:2018-01-19T00:00:00
db:VULHUBid:VHN-108944date:2017-12-27T00:00:00
db:VULMONid:CVE-2017-17878date:2017-12-27T00:00:00
db:JVNDBid:JVNDB-2017-011789date:2018-01-26T00:00:00
db:CNNVDid:CNNVD-201712-1005date:2017-12-28T00:00:00
db:NVDid:CVE-2017-17878date:2017-12-27T17:08:21.140