ID

VAR-201806-0757


CVE

CVE-2017-7906


TITLE

ABB IP Gateway Cross-Site Request Forgery Vulnerability

Trust: 0.8

sources: IVD: e2f46891-39ab-11e9-9cff-000c29342cb1 // CNVD: CNVD-2018-11992

DESCRIPTION

In ABB IP GATEWAY 3.39 and prior, the web server does not sufficiently verify that a request was performed by the authenticated user, which may allow an attacker to launch a request impersonating that user. ABB IP GATEWAY Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ABB IP GATEWAY is a building management system from ABB Switzerland. This vulnerability stems from a web server failing to fully validate requests from users. A remote attacker can exploit this vulnerability to impersonate a user to send a request. An authentication-bypass vulnerability 2. A cross-site request-forgery vulnerability 3. An information-disclosure vulnerability An attacker can exploit these issues to bypass the authentication mechanism and perform unauthorized actions, obtain sensitive information, or gain access to the affected application. IP Gateway Versions 3.39 and prior are vulnerable

Trust: 2.7

sources: NVD: CVE-2017-7906 // JVNDB: JVNDB-2017-013754 // CNVD: CNVD-2018-11992 // BID: 104388 // IVD: e2f46891-39ab-11e9-9cff-000c29342cb1 // VULHUB: VHN-116109

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2f46891-39ab-11e9-9cff-000c29342cb1 // CNVD: CNVD-2018-11992

AFFECTED PRODUCTS

vendor:abbmodel:ip gatewayscope:lteversion:3.39

Trust: 1.0

vendor:abbmodel:ip gatewayscope:eqversion:3.39

Trust: 0.9

vendor:abbmodel:ip-gatewayscope:lteversion:3.39

Trust: 0.8

vendor:abbmodel:ip gatewayscope:lteversion:<=3.39

Trust: 0.6

vendor:abbmodel:ip gatewayscope:neversion:3.40

Trust: 0.3

vendor:ip gatewaymodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2f46891-39ab-11e9-9cff-000c29342cb1 // CNVD: CNVD-2018-11992 // BID: 104388 // JVNDB: JVNDB-2017-013754 // CNNVD: CNNVD-201806-350 // NVD: CVE-2017-7906

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7906
value: HIGH

Trust: 1.0

NVD: CVE-2017-7906
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-11992
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-350
value: HIGH

Trust: 0.6

IVD: e2f46891-39ab-11e9-9cff-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-116109
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-7906
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-11992
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f46891-39ab-11e9-9cff-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-116109
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7906
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2f46891-39ab-11e9-9cff-000c29342cb1 // CNVD: CNVD-2018-11992 // VULHUB: VHN-116109 // JVNDB: JVNDB-2017-013754 // CNNVD: CNNVD-201806-350 // NVD: CVE-2017-7906

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-116109 // JVNDB: JVNDB-2017-013754 // NVD: CVE-2017-7906

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-350

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201806-350

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013754

PATCH

title:ABB-VU-EPBP-R-2505url:http://search.abb.com/library/Download.aspx?DocumentID=ABB-VU-EPBP-R-2505&LanguageCode=en&DocumentPartId=&Action=Launch

Trust: 0.8

title:Patch for ABB IP Gateway Cross-Site Request Forgery Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/132741

Trust: 0.6

title:ABB IP GATEWA Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80708

Trust: 0.6

sources: CNVD: CNVD-2018-11992 // JVNDB: JVNDB-2017-013754 // CNNVD: CNNVD-201806-350

EXTERNAL IDS

db:NVDid:CVE-2017-7906

Trust: 3.6

db:ICS CERTid:ICSA-18-156-01

Trust: 3.4

db:BIDid:104388

Trust: 2.0

db:CNNVDid:CNNVD-201806-350

Trust: 0.9

db:CNVDid:CNVD-2018-11992

Trust: 0.8

db:JVNDBid:JVNDB-2017-013754

Trust: 0.8

db:IVDid:E2F46891-39AB-11E9-9CFF-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-116109

Trust: 0.1

sources: IVD: e2f46891-39ab-11e9-9cff-000c29342cb1 // CNVD: CNVD-2018-11992 // VULHUB: VHN-116109 // BID: 104388 // JVNDB: JVNDB-2017-013754 // CNNVD: CNNVD-201806-350 // NVD: CVE-2017-7906

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-156-01

Trust: 3.4

url:http://www.securityfocus.com/bid/104388

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7906

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7906

Trust: 0.8

url:http://www.abb.com/

Trust: 0.3

url:http://search.abb.com/library/download.aspx?documentid=abb-vu-epbp-r-2505&languagecode=en&documentpartid=&action=launch

Trust: 0.3

sources: CNVD: CNVD-2018-11992 // VULHUB: VHN-116109 // BID: 104388 // JVNDB: JVNDB-2017-013754 // CNNVD: CNNVD-201806-350 // NVD: CVE-2017-7906

CREDITS

Florian Grunow of ERNW GmbH

Trust: 0.3

sources: BID: 104388

SOURCES

db:IVDid:e2f46891-39ab-11e9-9cff-000c29342cb1
db:CNVDid:CNVD-2018-11992
db:VULHUBid:VHN-116109
db:BIDid:104388
db:JVNDBid:JVNDB-2017-013754
db:CNNVDid:CNNVD-201806-350
db:NVDid:CVE-2017-7906

LAST UPDATE DATE

2024-11-23T22:06:47.901000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11992date:2018-06-25T00:00:00
db:VULHUBid:VHN-116109date:2019-10-09T00:00:00
db:BIDid:104388date:2018-06-05T00:00:00
db:JVNDBid:JVNDB-2017-013754date:2018-08-07T00:00:00
db:CNNVDid:CNNVD-201806-350date:2019-10-17T00:00:00
db:NVDid:CVE-2017-7906date:2024-11-21T03:32:56.210

SOURCES RELEASE DATE

db:IVDid:e2f46891-39ab-11e9-9cff-000c29342cb1date:2018-06-25T00:00:00
db:CNVDid:CNVD-2018-11992date:2018-06-25T00:00:00
db:VULHUBid:VHN-116109date:2018-06-06T00:00:00
db:BIDid:104388date:2018-06-05T00:00:00
db:JVNDBid:JVNDB-2017-013754date:2018-08-07T00:00:00
db:CNNVDid:CNNVD-201806-350date:2018-06-07T00:00:00
db:NVDid:CVE-2017-7906date:2018-06-06T20:29:00.267