ID

VAR-201808-0079


CVE

CVE-2017-14444


TITLE

Insteon Hub Buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2017-014115 // CNNVD: CNNVD-201709-624

DESCRIPTION

An exploitable buffer overflow vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly handles the URL parameter during a firmware update request, leading to a buffer overflow on a global section. An attacker can send an HTTP GET request to trigger this vulnerability. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Insteon Hub is an Insteon central controller product of Insteon Company in the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home

Trust: 1.8

sources: NVD: CVE-2017-14444 // JVNDB: JVNDB-2017-014115 // VULHUB: VHN-105167 // VULMON: CVE-2017-14444

IOT TAXONOMY

category:['home & office device']sub_category:smart home device

Trust: 0.1

category:['home & office device']sub_category:smart home controller

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:insteonmodel:hubscope:eqversion:1012

Trust: 2.4

sources: JVNDB: JVNDB-2017-014115 // CNNVD: CNNVD-201709-624 // NVD: CVE-2017-14444

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14444
value: CRITICAL

Trust: 1.0

talos-cna@cisco.com: CVE-2017-14444
value: HIGH

Trust: 1.0

NVD: CVE-2017-14444
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201709-624
value: CRITICAL

Trust: 0.6

VULHUB: VHN-105167
value: HIGH

Trust: 0.1

VULMON: CVE-2017-14444
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14444
severity: HIGH
baseScore: 8.0
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-105167
severity: HIGH
baseScore: 8.0
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14444
baseSeverity: CRITICAL
baseScore: 9.9
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.1
impactScore: 6.0
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2017-14444
baseSeverity: HIGH
baseScore: 8.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 6.0
version: 3.0

Trust: 1.0

NVD: CVE-2017-14444
baseSeverity: CRITICAL
baseScore: 9.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-105167 // VULMON: CVE-2017-14444 // JVNDB: JVNDB-2017-014115 // CNNVD: CNNVD-201709-624 // NVD: CVE-2017-14444 // NVD: CVE-2017-14444

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-105167 // JVNDB: JVNDB-2017-014115 // NVD: CVE-2017-14444

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-624

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201709-624

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014115

PATCH

title:Top Pageurl:https://www.insteon.com/

Trust: 0.8

title: - url:https://github.com/Live-Hack-CVE/CVE-2017-14444

Trust: 0.1

sources: VULMON: CVE-2017-14444 // JVNDB: JVNDB-2017-014115

EXTERNAL IDS

db:NVDid:CVE-2017-14444

Trust: 2.7

db:TALOSid:TALOS-2017-0493

Trust: 2.6

db:JVNDBid:JVNDB-2017-014115

Trust: 0.8

db:CNNVDid:CNNVD-201709-624

Trust: 0.7

db:OTHERid:NONE

Trust: 0.1

db:SEEBUGid:SSVID-97356

Trust: 0.1

db:VULHUBid:VHN-105167

Trust: 0.1

db:VULMONid:CVE-2017-14444

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-105167 // VULMON: CVE-2017-14444 // JVNDB: JVNDB-2017-014115 // CNNVD: CNNVD-201709-624 // NVD: CVE-2017-14444

REFERENCES

url:https://www.talosintelligence.com/vulnerability_reports/talos-2017-0493

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14444

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14444

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0493

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2017-14444

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-105167 // VULMON: CVE-2017-14444 // JVNDB: JVNDB-2017-014115 // CNNVD: CNNVD-201709-624 // NVD: CVE-2017-14444

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-105167
db:VULMONid:CVE-2017-14444
db:JVNDBid:JVNDB-2017-014115
db:CNNVDid:CNNVD-201709-624
db:NVDid:CVE-2017-14444

LAST UPDATE DATE

2025-01-30T22:34:03.738000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-105167date:2022-12-14T00:00:00
db:VULMONid:CVE-2017-14444date:2022-12-14T00:00:00
db:JVNDBid:JVNDB-2017-014115date:2018-10-26T00:00:00
db:CNNVDid:CNNVD-201709-624date:2022-04-20T00:00:00
db:NVDid:CVE-2017-14444date:2024-11-21T03:12:48.480

SOURCES RELEASE DATE

db:VULHUBid:VHN-105167date:2018-08-02T00:00:00
db:VULMONid:CVE-2017-14444date:2018-08-02T00:00:00
db:JVNDBid:JVNDB-2017-014115date:2018-10-26T00:00:00
db:CNNVDid:CNNVD-201709-624date:2017-09-15T00:00:00
db:NVDid:CVE-2017-14444date:2018-08-02T19:29:00.233