ID

VAR-201906-0711


CVE

CVE-2017-10723


TITLE

Shekar Endoscope Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-014517

DESCRIPTION

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. The firmware contains binary uvc_stream that is the UDP daemon which is responsible for handling all the UDP requests that the device receives. The client application sends a UDP request to change the Wi-Fi name which contains the following format: "SETCMD0001+0001+[2 byte length of wifiname]+[Wifiname]. This request is handled by "control_Dev_thread" function which at address "0x00409AE0" compares the incoming request and determines if the 10th byte is 01 and if it is then it redirects to 0x0040A74C which calls the function "setwifiname". The function "setwifiname" uses a memcpy function but uses the length of the payload obtained by using strlen function as the third parameter which is the number of bytes to copy and this allows an attacker to overflow the function and control the $PC value. Shekar Endoscope Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SHEKARTechnologyEndoscope is a portable endoscope device from SHEKARTechnology, China. A buffer overflow vulnerability exists in SHEKARTechnologyEndoscope. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow

Trust: 2.34

sources: NVD: CVE-2017-10723 // JVNDB: JVNDB-2017-014517 // CNVD: CNVD-2019-18879 // VULHUB: VHN-101074 // VULMON: CVE-2017-10723

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['camera device', 'other device']sub_category:camera

Trust: 0.1

category:['camera device', 'other device']sub_category:general

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-18879

AFFECTED PRODUCTS

vendor:ishekarmodel:endoscope camerascope:eqversion:*

Trust: 1.0

vendor:shekarmodel:endoscopescope: - version: -

Trust: 0.8

vendor:shekarmodel:technology endoscopescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-18879 // JVNDB: JVNDB-2017-014517 // NVD: CVE-2017-10723

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-10723
value: HIGH

Trust: 1.0

NVD: CVE-2017-10723
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-18879
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-673
value: HIGH

Trust: 0.6

VULHUB: VHN-101074
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-10723
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-10723
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-18879
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-101074
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-10723
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-18879 // VULHUB: VHN-101074 // VULMON: CVE-2017-10723 // JVNDB: JVNDB-2017-014517 // CNNVD: CNNVD-201906-673 // NVD: CVE-2017-10723

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-101074 // JVNDB: JVNDB-2017-014517 // NVD: CVE-2017-10723

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-673

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201906-673

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014517

PATCH

title:endoscopeurl:http://ishekar.com/en/Products/endoscope/

Trust: 0.8

title:IoT_vulnerabilitiesurl:https://github.com/ethanhunnt/IoT_vulnerabilities

Trust: 0.1

sources: VULMON: CVE-2017-10723 // JVNDB: JVNDB-2017-014517

EXTERNAL IDS

db:NVDid:CVE-2017-10723

Trust: 3.4

db:PACKETSTORMid:153241

Trust: 1.9

db:JVNDBid:JVNDB-2017-014517

Trust: 0.8

db:CNNVDid:CNNVD-201906-673

Trust: 0.7

db:CNVDid:CNVD-2019-18879

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-101074

Trust: 0.1

db:VULMONid:CVE-2017-10723

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-18879 // VULHUB: VHN-101074 // VULMON: CVE-2017-10723 // JVNDB: JVNDB-2017-014517 // PACKETSTORM: 153241 // CNNVD: CNNVD-201906-673 // NVD: CVE-2017-10723

REFERENCES

url:https://github.com/ethanhunnt/iot_vulnerabilities/blob/master/shekar_boriscope_sec_issues.pdf

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-10723

Trust: 2.1

url:https://seclists.org/bugtraq/2019/jun/8

Trust: 1.8

url:http://packetstormsecurity.com/files/153241/shekar-endoscope-weak-default-settings-memory-corruption.html

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10723

Trust: 0.8

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/ethanhunnt/iot_vulnerabilities

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10721

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10724

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-18879 // VULHUB: VHN-101074 // VULMON: CVE-2017-10723 // JVNDB: JVNDB-2017-014517 // PACKETSTORM: 153241 // CNNVD: CNNVD-201906-673 // NVD: CVE-2017-10723

CREDITS

Mandar Satam

Trust: 0.1

sources: PACKETSTORM: 153241

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2019-18879
db:VULHUBid:VHN-101074
db:VULMONid:CVE-2017-10723
db:JVNDBid:JVNDB-2017-014517
db:PACKETSTORMid:153241
db:CNNVDid:CNNVD-201906-673
db:NVDid:CVE-2017-10723

LAST UPDATE DATE

2025-01-30T21:46:01.353000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-18879date:2019-06-24T00:00:00
db:VULHUBid:VHN-101074date:2019-06-20T00:00:00
db:VULMONid:CVE-2017-10723date:2019-06-20T00:00:00
db:JVNDBid:JVNDB-2017-014517date:2019-06-24T00:00:00
db:CNNVDid:CNNVD-201906-673date:2019-06-21T00:00:00
db:NVDid:CVE-2017-10723date:2024-11-21T03:06:20.593

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-18879date:2019-06-20T00:00:00
db:VULHUBid:VHN-101074date:2019-06-17T00:00:00
db:VULMONid:CVE-2017-10723date:2019-06-17T00:00:00
db:JVNDBid:JVNDB-2017-014517date:2019-06-24T00:00:00
db:PACKETSTORMid:153241date:2019-06-09T09:32:22
db:CNNVDid:CNNVD-201906-673date:2019-06-17T00:00:00
db:NVDid:CVE-2017-10723date:2019-06-17T22:15:10.200