ID

VAR-201801-0577


CVE

CVE-2017-14698


TITLE

plural ASUS DSL Vulnerabilities related to certificate and password management in routers

Trust: 0.8

sources: JVNDB: JVNDB-2017-012487

DESCRIPTION

plural ASUS DSL The router contains a vulnerability related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS DSL-AC51, etc. are ASUS wireless router products. A security vulnerability exists in several ASUS routers. A remote attacker could exploit this vulnerability to change any user's password by sending the 'http_passwd' parameter to the mod_login.asp file. The following products are affected: ASUS DSL-AC51; DSL-AC52U; DSL-AC55U; DSL-N55U C1; DSL-N55U D1; DSL-AC56U; DSL-N14U-B1;DSL-N16;DSL-N16U;DSL-N17U;DSL-N66U;DSL-AC750

Trust: 0.81

sources: JVNDB: JVNDB-2017-012487 // VULHUB: VHN-105446

AFFECTED PRODUCTS

vendor:asusmodel:dsl-n12u c1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n66uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n14uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n16uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n16scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n12e c1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n17uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n14u-b1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n10 c1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-ac750scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-ac55uscope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-ac52uscope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-n55u c1scope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-ac51scope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-ac56uscope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-n55u d1scope:eqversion: -

Trust: 1.0

vendor:asustek computermodel:dsl-ac51scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac52uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac55uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac56uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac750scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n10 c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n12e c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n12u c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n14uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n14u-b1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n16scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n16uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n17uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n55u c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n55u d1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n66uscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-012487 // CNNVD: CNNVD-201709-1079 // NVD: CVE-2017-14698

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14698
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-14698
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201709-1079
value: CRITICAL

Trust: 0.6

VULHUB: VHN-105446
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-14698
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-105446
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14698
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-105446 // JVNDB: JVNDB-2017-012487 // CNNVD: CNNVD-201709-1079 // NVD: CVE-2017-14698

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.1

problemtype:CWE-255

Trust: 0.9

sources: VULHUB: VHN-105446 // JVNDB: JVNDB-2017-012487 // NVD: CVE-2017-14698

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-1079

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201709-1079

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-012487

PATCH

title:DSL-N14U B1url:https://www.asus.com/Networking/DSL-N14U-B1/HelpDesk_BIOS/

Trust: 0.8

title:Multiple ASUS Repair measures for router security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100066

Trust: 0.6

sources: JVNDB: JVNDB-2017-012487 // CNNVD: CNNVD-201709-1079

EXTERNAL IDS

db:NVDid:CVE-2017-14698

Trust: 2.5

db:JVNDBid:JVNDB-2017-012487

Trust: 0.8

db:CNNVDid:CNNVD-201709-1079

Trust: 0.7

db:VULHUBid:VHN-105446

Trust: 0.1

sources: VULHUB: VHN-105446 // JVNDB: JVNDB-2017-012487 // CNNVD: CNNVD-201709-1079 // NVD: CVE-2017-14698

REFERENCES

url:https://www.asus.com/networking/dsl-n14u-b1/helpdesk_bios/

Trust: 1.7

url:https://www.securityartwork.es/2018/01/25/some-vulnerability-in-asus-routers/

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14698

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14698

Trust: 0.8

sources: VULHUB: VHN-105446 // JVNDB: JVNDB-2017-012487 // CNNVD: CNNVD-201709-1079 // NVD: CVE-2017-14698

SOURCES

db:VULHUBid:VHN-105446
db:JVNDBid:JVNDB-2017-012487
db:CNNVDid:CNNVD-201709-1079
db:NVDid:CVE-2017-14698

LAST UPDATE DATE

2024-11-23T22:38:17.635000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-105446date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-012487date:2018-03-13T00:00:00
db:CNNVDid:CNNVD-201709-1079date:2019-10-23T00:00:00
db:NVDid:CVE-2017-14698date:2024-11-21T03:13:20.777

SOURCES RELEASE DATE

db:VULHUBid:VHN-105446date:2018-01-29T00:00:00
db:JVNDBid:JVNDB-2017-012487date:2018-03-13T00:00:00
db:CNNVDid:CNNVD-201709-1079date:2017-09-25T00:00:00
db:NVDid:CVE-2017-14698date:2018-01-29T16:29:00.293