ID

VAR-201712-0667


CVE

CVE-2017-6094


TITLE

Genexis GAPS Vulnerable to information disclosure

Trust: 0.8

sources: JVNDB: JVNDB-2017-011783

DESCRIPTION

CPEs used by subscribers on the access network receive their individual configuration settings from a central GAPS instance. A CPE identifies itself by the MAC address of its WAN interface and a certain "chk" value (48bit) derived from the MAC. The algorithm used to compute the "chk" was disclosed by reverse engineering the CPE's firmware. As a result, it is possible to forge valid "chk" values for any given MAC address and therefore receive the configuration settings of other subscribers' CPEs. The configuration settings often contain sensitive values, for example credentials (username/password) for VoIP services. This issue affects Genexis B.V. GAPS up to 7.2. Genexis GAPS Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GenexisAutomaticProvisioning System (GAPS) is a system of GENEXIS in the Netherlands for automatically configuring routers and networks. An access control vulnerability exists in GAPS 7.2 and earlier. An attacker could use this vulnerability to obtain configuration information (user credentials)

Trust: 2.16

sources: NVD: CVE-2017-6094 // JVNDB: JVNDB-2017-011783 // CNVD: CNVD-2018-01621

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-01621

AFFECTED PRODUCTS

vendor:genexismodel:gapsscope:ltversion:7.2

Trust: 1.0

vendor:genexismodel:gapsscope:lteversion:7.2

Trust: 0.8

vendor:genexismodel:automatic provisioning systemscope:lteversion:<=7.2

Trust: 0.6

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // NVD: CVE-2017-6094

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-6094
value: CRITICAL

Trust: 1.8

CNVD: CNVD-2018-01621
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201702-690
value: MEDIUM

Trust: 0.6

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2017-6094
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2018-01621
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

NVD:
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2017-6094
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // NVD: CVE-2017-6094 // CNNVD: CNNVD-201702-690

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2017-011783 // NVD: CVE-2017-6094

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-690

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201702-690

CONFIGURATIONS

sources: NVD: CVE-2017-6094

PATCH

title:GAPSurl:https://genexis.eu/product/gaps/

Trust: 0.8

sources: JVNDB: JVNDB-2017-011783

EXTERNAL IDS

db:NVDid:CVE-2017-6094

Trust: 3.0

db:JVNDBid:JVNDB-2017-011783

Trust: 0.8

db:CNVDid:CNVD-2018-01621

Trust: 0.6

db:CNNVDid:CNNVD-201702-690

Trust: 0.6

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // NVD: CVE-2017-6094 // CNNVD: CNNVD-201702-690

REFERENCES

url:http://seclists.org/fulldisclosure/2017/dec/62

Trust: 3.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6094

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6094

Trust: 0.8

sources: CNVD: CNVD-2018-01621 // JVNDB: JVNDB-2017-011783 // NVD: CVE-2017-6094 // CNNVD: CNNVD-201702-690

SOURCES

db:CNVDid:CNVD-2018-01621
db:JVNDBid:JVNDB-2017-011783
db:NVDid:CVE-2017-6094
db:CNNVDid:CNNVD-201702-690

LAST UPDATE DATE

2023-12-18T13:43:52.609000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-01621date:2018-01-22T00:00:00
db:JVNDBid:JVNDB-2017-011783date:2018-01-26T00:00:00
db:NVDid:CVE-2017-6094date:2018-01-11T15:10:05.010
db:CNNVDid:CNNVD-201702-690date:2017-12-25T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-01621date:2018-01-22T00:00:00
db:JVNDBid:JVNDB-2017-011783date:2018-01-26T00:00:00
db:NVDid:CVE-2017-6094date:2017-12-20T20:29:00.573
db:CNNVDid:CNNVD-201702-690date:2017-02-21T00:00:00