ID

VAR-201712-0667


CVE

CVE-2017-6094


TITLE

Genexis GAPS Vulnerable to information disclosure

Trust: 0.8

sources: JVNDB: JVNDB-2017-011783

DESCRIPTION

CPEs used by subscribers on the access network receive their individual configuration settings from a central GAPS instance. A CPE identifies itself by the MAC address of its WAN interface and a certain "chk" value (48bit) derived from the MAC. The algorithm used to compute the "chk" was disclosed by reverse engineering the CPE's firmware. As a result, it is possible to forge valid "chk" values for any given MAC address and therefore receive the configuration settings of other subscribers' CPEs. The configuration settings often contain sensitive values, for example credentials (username/password) for VoIP services. This issue affects Genexis B.V. GAPS up to 7.2. Genexis GAPS Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GenexisAutomaticProvisioning System (GAPS) is a system of GENEXIS in the Netherlands for automatically configuring routers and networks. An access control vulnerability exists in GAPS 7.2 and earlier. An attacker could use this vulnerability to obtain configuration information (user credentials)

Trust: 2.16

sources: NVD: CVE-2017-6094 // JVNDB: JVNDB-2017-011783 // CNVD: CNVD-2018-01621

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-01621

AFFECTED PRODUCTS

vendor:genexismodel:gapsscope:ltversion:7.2

Trust: 1.0

vendor:genexismodel:gapsscope:lteversion:7.2

Trust: 0.8

vendor:genexismodel:automatic provisioning systemscope:lteversion:<=7.2

Trust: 0.6

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // NVD: CVE-2017-6094

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6094
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-6094
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-01621
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201702-690
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2017-6094
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-01621
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-6094
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // CNNVD: CNNVD-201702-690 // NVD: CVE-2017-6094

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2017-011783 // NVD: CVE-2017-6094

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-690

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201702-690

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011783

PATCH

title:GAPSurl:https://genexis.eu/product/gaps/

Trust: 0.8

sources: JVNDB: JVNDB-2017-011783

EXTERNAL IDS

db:NVDid:CVE-2017-6094

Trust: 3.0

db:JVNDBid:JVNDB-2017-011783

Trust: 0.8

db:CNVDid:CNVD-2018-01621

Trust: 0.6

db:CNNVDid:CNNVD-201702-690

Trust: 0.6

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // CNNVD: CNNVD-201702-690 // NVD: CVE-2017-6094

REFERENCES

url:http://seclists.org/fulldisclosure/2017/dec/62

Trust: 3.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6094

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6094

Trust: 0.8

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // CNNVD: CNNVD-201702-690 // NVD: CVE-2017-6094

SOURCES

db:CNVDid:CNVD-2018-01621
db:JVNDBid:JVNDB-2017-011783
db:CNNVDid:CNNVD-201702-690
db:NVDid:CVE-2017-6094

LAST UPDATE DATE

2025-04-20T23:34:15.074000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-01621date:2018-01-22T00:00:00
db:JVNDBid:JVNDB-2017-011783date:2018-01-26T00:00:00
db:CNNVDid:CNNVD-201702-690date:2017-12-25T00:00:00
db:NVDid:CVE-2017-6094date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-01621date:2018-01-22T00:00:00
db:JVNDBid:JVNDB-2017-011783date:2018-01-26T00:00:00
db:CNNVDid:CNNVD-201702-690date:2017-02-21T00:00:00
db:NVDid:CVE-2017-6094date:2017-12-20T20:29:00.573