ID

VAR-201802-0553


CVE

CVE-2017-17101


TITLE

Apexis APM-H803-MPC Vulnerability related to authorization, authority, and access control in software

Trust: 0.8

sources: JVNDB: JVNDB-2017-012742

DESCRIPTION

An issue was discovered in Apexis APM-H803-MPC software, as used with many different models of IP Camera. An unprotected CGI method inside the web application permits an unauthenticated user to bypass the login screen and access the webcam contents including: live video stream, configuration files with all the passwords, system information, and much more. With this vulnerability, anyone can access to a vulnerable webcam with 'super admin' privilege. Apexis APM-H803-MPC The software contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apexis APM-H803-MPC is an infrared network camera product of China Fuhong (Apexis) Electronics Company. Apexis APM-H803-MPC with firmware version 1.1.2.69 has a privilege escalation vulnerability

Trust: 1.8

sources: NVD: CVE-2017-17101 // JVNDB: JVNDB-2017-012742 // VULHUB: VHN-108090 // VULMON: CVE-2017-17101

AFFECTED PRODUCTS

vendor:apexismodel:apm-h803-mpcscope:eqversion:1.1.2.69

Trust: 1.6

vendor:apexismodel:apm-h803-mpcscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-012742 // CNNVD: CNNVD-201712-148 // NVD: CVE-2017-17101

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-17101
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-17101
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201712-148
value: CRITICAL

Trust: 0.6

VULHUB: VHN-108090
value: HIGH

Trust: 0.1

VULMON: CVE-2017-17101
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-17101
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-108090
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-17101
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-108090 // VULMON: CVE-2017-17101 // JVNDB: JVNDB-2017-012742 // CNNVD: CNNVD-201712-148 // NVD: CVE-2017-17101

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-108090 // JVNDB: JVNDB-2017-012742 // NVD: CVE-2017-17101

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-148

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201712-148

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-012742

PATCH

title:Top Pageurl:http://www.apexis.com.cn/

Trust: 0.8

title: - url:https://github.com/atyant-yadav/freelance-iot

Trust: 0.1

sources: VULMON: CVE-2017-17101 // JVNDB: JVNDB-2017-012742

EXTERNAL IDS

db:NVDid:CVE-2017-17101

Trust: 2.6

db:JVNDBid:JVNDB-2017-012742

Trust: 0.8

db:CNNVDid:CNNVD-201712-148

Trust: 0.7

db:VULHUBid:VHN-108090

Trust: 0.1

db:VULMONid:CVE-2017-17101

Trust: 0.1

sources: VULHUB: VHN-108090 // VULMON: CVE-2017-17101 // JVNDB: JVNDB-2017-012742 // CNNVD: CNNVD-201712-148 // NVD: CVE-2017-17101

REFERENCES

url:https://youtu.be/b75c13zw35y

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17101

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-17101

Trust: 0.8

url:https://www.youtube.com/watch?v=b75c13zw35y&feature=youtu.be

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/atyant-yadav/freelance-iot

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-108090 // VULMON: CVE-2017-17101 // JVNDB: JVNDB-2017-012742 // CNNVD: CNNVD-201712-148 // NVD: CVE-2017-17101

SOURCES

db:VULHUBid:VHN-108090
db:VULMONid:CVE-2017-17101
db:JVNDBid:JVNDB-2017-012742
db:CNNVDid:CNNVD-201712-148
db:NVDid:CVE-2017-17101

LAST UPDATE DATE

2024-11-23T22:30:30.323000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-108090date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-17101date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-012742date:2018-04-12T00:00:00
db:CNNVDid:CNNVD-201712-148date:2019-10-23T00:00:00
db:NVDid:CVE-2017-17101date:2024-11-21T03:17:29.363

SOURCES RELEASE DATE

db:VULHUBid:VHN-108090date:2018-02-19T00:00:00
db:VULMONid:CVE-2017-17101date:2018-02-19T00:00:00
db:JVNDBid:JVNDB-2017-012742date:2018-04-12T00:00:00
db:CNNVDid:CNNVD-201712-148date:2017-12-05T00:00:00
db:NVDid:CVE-2017-17101date:2018-02-19T19:29:00.657