ID

VAR-201906-0712


CVE

CVE-2017-10724


TITLE

Shekar Endoscope Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-014518

DESCRIPTION

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. The firmware contains binary uvc_stream that is the UDP daemon which is responsible for handling all the UDP requests that the device receives. The client application sends a UDP request to change the Wi-Fi name which contains the following format: "SETCMD0001+0002+[2 byte length of wifipassword]+[Wifipassword]. This request is handled by "control_Dev_thread" function which at address "0x00409AE4" compares the incoming request and determines if the 10th byte is 02 and if it is then it redirects to 0x0040A7D8, which calls the function "setwifipassword". The function "setwifipassword" uses a memcpy function but uses the length of the payload obtained by using strlen function as the third parameter which is the number of bytes to copy and this allows an attacker to overflow the function and control the $PC value. Shekar Endoscope Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SHEKARTechnologyEndoscope is a portable endoscope device from SHEKARTechnology, China. A buffer overflow vulnerability exists in SHEKARTechnologyEndoscope that could be exploited by an attacker to cause a buffer overflow or heap overflow. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations

Trust: 2.34

sources: NVD: CVE-2017-10724 // JVNDB: JVNDB-2017-014518 // CNVD: CNVD-2019-25508 // VULHUB: VHN-101075 // VULMON: CVE-2017-10724

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['camera device', 'other device']sub_category:camera

Trust: 0.1

category:['camera device', 'other device']sub_category:general

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-25508

AFFECTED PRODUCTS

vendor:ishekarmodel:endoscope camerascope:eqversion:*

Trust: 1.0

vendor:shekarmodel:endoscopescope: - version: -

Trust: 0.8

vendor:shekarmodel:technology endoscopescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-25508 // JVNDB: JVNDB-2017-014518 // NVD: CVE-2017-10724

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-10724
value: HIGH

Trust: 1.0

NVD: CVE-2017-10724
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-25508
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-675
value: HIGH

Trust: 0.6

VULHUB: VHN-101075
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-10724
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-10724
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-25508
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-101075
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-10724
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-25508 // VULHUB: VHN-101075 // VULMON: CVE-2017-10724 // JVNDB: JVNDB-2017-014518 // CNNVD: CNNVD-201906-675 // NVD: CVE-2017-10724

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-101075 // JVNDB: JVNDB-2017-014518 // NVD: CVE-2017-10724

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-675

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201906-675

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014518

PATCH

title:endoscopeurl:http://ishekar.com/en/Products/endoscope/

Trust: 0.8

title:IoT_vulnerabilitiesurl:https://github.com/ethanhunnt/IoT_vulnerabilities

Trust: 0.1

sources: VULMON: CVE-2017-10724 // JVNDB: JVNDB-2017-014518

EXTERNAL IDS

db:NVDid:CVE-2017-10724

Trust: 3.4

db:PACKETSTORMid:153241

Trust: 2.5

db:JVNDBid:JVNDB-2017-014518

Trust: 0.8

db:CNNVDid:CNNVD-201906-675

Trust: 0.7

db:CNVDid:CNVD-2019-25508

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-101075

Trust: 0.1

db:VULMONid:CVE-2017-10724

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-25508 // VULHUB: VHN-101075 // VULMON: CVE-2017-10724 // JVNDB: JVNDB-2017-014518 // PACKETSTORM: 153241 // CNNVD: CNNVD-201906-675 // NVD: CVE-2017-10724

REFERENCES

url:https://github.com/ethanhunnt/iot_vulnerabilities/blob/master/shekar_boriscope_sec_issues.pdf

Trust: 3.2

url:http://packetstormsecurity.com/files/153241/shekar-endoscope-weak-default-settings-memory-corruption.html

Trust: 2.4

url:https://seclists.org/bugtraq/2019/jun/8

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2017-10724

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10724

Trust: 0.8

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/ethanhunnt/iot_vulnerabilities

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10721

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10723

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-25508 // VULHUB: VHN-101075 // VULMON: CVE-2017-10724 // JVNDB: JVNDB-2017-014518 // PACKETSTORM: 153241 // CNNVD: CNNVD-201906-675 // NVD: CVE-2017-10724

CREDITS

Mandar Satam

Trust: 0.1

sources: PACKETSTORM: 153241

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2019-25508
db:VULHUBid:VHN-101075
db:VULMONid:CVE-2017-10724
db:JVNDBid:JVNDB-2017-014518
db:PACKETSTORMid:153241
db:CNNVDid:CNNVD-201906-675
db:NVDid:CVE-2017-10724

LAST UPDATE DATE

2025-01-30T19:51:44.038000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-25508date:2019-08-02T00:00:00
db:VULHUBid:VHN-101075date:2019-06-20T00:00:00
db:VULMONid:CVE-2017-10724date:2019-06-20T00:00:00
db:JVNDBid:JVNDB-2017-014518date:2019-06-24T00:00:00
db:CNNVDid:CNNVD-201906-675date:2019-06-21T00:00:00
db:NVDid:CVE-2017-10724date:2024-11-21T03:06:20.780

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-25508date:2019-08-02T00:00:00
db:VULHUBid:VHN-101075date:2019-06-17T00:00:00
db:VULMONid:CVE-2017-10724date:2019-06-17T00:00:00
db:JVNDBid:JVNDB-2017-014518date:2019-06-24T00:00:00
db:PACKETSTORMid:153241date:2019-06-09T09:32:22
db:CNNVDid:CNNVD-201906-675date:2019-06-17T00:00:00
db:NVDid:CVE-2017-10724date:2019-06-17T22:15:10.263