ID

VAR-201801-0578


CVE

CVE-2017-14699


TITLE

plural ASUS In the router XML External entity vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2017-012335

DESCRIPTION

plural ASUS The router has XML An external entity vulnerability exists.Information may be obtained. ASUS DSL-AC51, etc. are ASUS wireless router products. A remote attacker could exploit this vulnerability to read arbitrary files with a specially crafted DTD in an UPDATEACCOUNT or PROPFIND request. The following products are affected: ASUS DSL-AC51; DSL-AC52U; DSL-AC55U; DSL-N55U C1; DSL-N55U D1; DSL-AC56U; DSL-N14U-B1;DSL-N16;DSL-N16U;DSL-N17U;DSL-N66U;DSL-AC750

Trust: 0.81

sources: JVNDB: JVNDB-2017-012335 // VULHUB: VHN-105447

AFFECTED PRODUCTS

vendor:asusmodel:dsl-n12u c1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n66uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n14uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n16uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n16scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n12e c1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n17uscope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n14u-b1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-n10 c1scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-ac750scope:eqversion: -

Trust: 1.6

vendor:asusmodel:dsl-ac55uscope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-ac52uscope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-n55u c1scope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-ac51scope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-ac56uscope:eqversion: -

Trust: 1.0

vendor:asusmodel:dsl-n55u d1scope:eqversion: -

Trust: 1.0

vendor:asustek computermodel:dsl-ac51scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac52uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac55uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac56uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-ac750scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n10 c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n12e c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n12u c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n14uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n14u-b1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n16scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n16uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n17uscope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n55u c1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n55u d1scope: - version: -

Trust: 0.8

vendor:asustek computermodel:dsl-n66uscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-012335 // CNNVD: CNNVD-201709-1078 // NVD: CVE-2017-14699

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14699
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-14699
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201709-1078
value: MEDIUM

Trust: 0.6

VULHUB: VHN-105447
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-14699
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-105447
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14699
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-105447 // JVNDB: JVNDB-2017-012335 // CNNVD: CNNVD-201709-1078 // NVD: CVE-2017-14699

PROBLEMTYPE DATA

problemtype:CWE-611

Trust: 1.9

sources: VULHUB: VHN-105447 // JVNDB: JVNDB-2017-012335 // NVD: CVE-2017-14699

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-1078

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201709-1078

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-012335

PATCH

title:DSL-N14U B1url:https://www.asus.com/Networking/DSL-N14U-B1/HelpDesk_BIOS/

Trust: 0.8

sources: JVNDB: JVNDB-2017-012335

EXTERNAL IDS

db:NVDid:CVE-2017-14699

Trust: 2.5

db:JVNDBid:JVNDB-2017-012335

Trust: 0.8

db:CNNVDid:CNNVD-201709-1078

Trust: 0.7

db:VULHUBid:VHN-105447

Trust: 0.1

sources: VULHUB: VHN-105447 // JVNDB: JVNDB-2017-012335 // CNNVD: CNNVD-201709-1078 // NVD: CVE-2017-14699

REFERENCES

url:https://www.asus.com/networking/dsl-n14u-b1/helpdesk_bios/

Trust: 1.7

url:https://www.securityartwork.es/2018/01/25/some-vulnerability-in-asus-routers/

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14699

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14699

Trust: 0.8

sources: VULHUB: VHN-105447 // JVNDB: JVNDB-2017-012335 // CNNVD: CNNVD-201709-1078 // NVD: CVE-2017-14699

SOURCES

db:VULHUBid:VHN-105447
db:JVNDBid:JVNDB-2017-012335
db:CNNVDid:CNNVD-201709-1078
db:NVDid:CVE-2017-14699

LAST UPDATE DATE

2024-11-23T22:48:51.907000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-105447date:2018-02-22T00:00:00
db:JVNDBid:JVNDB-2017-012335date:2018-03-07T00:00:00
db:CNNVDid:CNNVD-201709-1078date:2018-01-30T00:00:00
db:NVDid:CVE-2017-14699date:2024-11-21T03:13:20.940

SOURCES RELEASE DATE

db:VULHUBid:VHN-105447date:2018-01-29T00:00:00
db:JVNDBid:JVNDB-2017-012335date:2018-03-07T00:00:00
db:CNNVDid:CNNVD-201709-1078date:2017-09-25T00:00:00
db:NVDid:CVE-2017-14699date:2018-01-29T16:29:00.357