ID

VAR-201907-1045


CVE

CVE-2017-11580


TITLE

Blipcare Wifi blood pressure monitor Vulnerabilities related to resource management in devices

Trust: 0.8

sources: JVNDB: JVNDB-2017-014573

DESCRIPTION

Blipcare Wifi blood pressure monitor BP700 10.1 devices allow memory corruption that results in Denial of Service. When connected to the "Blip" open wireless connection provided by the device, if a large string is sent as a part of the HTTP request in any part of the HTTP headers, the device could become completely unresponsive. Presumably this happens as the memory footprint provided to this device is very small. According to the specs from Rezolt, the Wi-Fi module only has 256k of memory. As a result, an incorrect string copy operation using either memcpy, strcpy, or any of their other variants could result in filling up the memory space allocated to the function executing and this would result in memory corruption. To test the theory, one can modify the demo application provided by the Cypress WICED SDK and introduce an incorrect "memcpy" operation and use the compiled application on the evaluation board provided by Cypress semiconductors with exactly the same Wi-Fi SOC. The results were identical where the device would completely stop responding to any of the ping or web requests. An attacker could exploit this vulnerability to cause a denial of service

Trust: 1.8

sources: NVD: CVE-2017-11580 // JVNDB: JVNDB-2017-014573 // VULHUB: VHN-102017 // VULMON: CVE-2017-11580

AFFECTED PRODUCTS

vendor:blipcaremodel:wi-fi blood pressure monitorscope:lteversion:bp700_10.1

Trust: 1.0

vendor:blipcaremodel:wifi blood pressure monitorscope:eqversion:bp700 10.1

Trust: 0.8

sources: JVNDB: JVNDB-2017-014573 // NVD: CVE-2017-11580

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-11580
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-11580
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201707-1026
value: MEDIUM

Trust: 0.6

VULHUB: VHN-102017
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-11580
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-11580
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-102017
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-11580
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-102017 // VULMON: CVE-2017-11580 // JVNDB: JVNDB-2017-014573 // CNNVD: CNNVD-201707-1026 // NVD: CVE-2017-11580

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-102017 // JVNDB: JVNDB-2017-014573 // NVD: CVE-2017-11580

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201707-1026

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201707-1026

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014573

PATCH

title:Wi-Fi Blood Pressure Monitorurl:http://www.blipcare.com/blip-bp.html

Trust: 0.8

title:Blipcare Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94344

Trust: 0.6

title:IoT_vulnerabilitiesurl:https://github.com/ethanhunnt/IoT_vulnerabilities

Trust: 0.1

sources: VULMON: CVE-2017-11580 // JVNDB: JVNDB-2017-014573 // CNNVD: CNNVD-201707-1026

EXTERNAL IDS

db:NVDid:CVE-2017-11580

Trust: 2.7

db:PACKETSTORMid:153225

Trust: 1.9

db:JVNDBid:JVNDB-2017-014573

Trust: 0.8

db:CNNVDid:CNNVD-201707-1026

Trust: 0.7

db:VULHUBid:VHN-102017

Trust: 0.1

db:VULMONid:CVE-2017-11580

Trust: 0.1

sources: VULHUB: VHN-102017 // VULMON: CVE-2017-11580 // JVNDB: JVNDB-2017-014573 // PACKETSTORM: 153225 // CNNVD: CNNVD-201707-1026 // NVD: CVE-2017-11580

REFERENCES

url:https://github.com/ethanhunnt/iot_vulnerabilities/blob/master/blipcare_sec_issues.pdf

Trust: 2.6

url:https://seclists.org/bugtraq/2019/jun/8

Trust: 1.8

url:http://packetstormsecurity.com/files/153225/blipcare-clear-text-communication-memory-corruption.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-11580

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11580

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/ethanhunnt/iot_vulnerabilities

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11578

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11579

Trust: 0.1

sources: VULHUB: VHN-102017 // VULMON: CVE-2017-11580 // JVNDB: JVNDB-2017-014573 // PACKETSTORM: 153225 // CNNVD: CNNVD-201707-1026 // NVD: CVE-2017-11580

CREDITS

Mandar Satam

Trust: 0.1

sources: PACKETSTORM: 153225

SOURCES

db:VULHUBid:VHN-102017
db:VULMONid:CVE-2017-11580
db:JVNDBid:JVNDB-2017-014573
db:PACKETSTORMid:153225
db:CNNVDid:CNNVD-201707-1026
db:NVDid:CVE-2017-11580

LAST UPDATE DATE

2024-11-23T22:16:57.026000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-102017date:2019-07-15T00:00:00
db:VULMONid:CVE-2017-11580date:2019-07-15T00:00:00
db:JVNDBid:JVNDB-2017-014573date:2019-07-17T00:00:00
db:CNNVDid:CNNVD-201707-1026date:2019-07-16T00:00:00
db:NVDid:CVE-2017-11580date:2024-11-21T03:08:04.350

SOURCES RELEASE DATE

db:VULHUBid:VHN-102017date:2019-07-02T00:00:00
db:VULMONid:CVE-2017-11580date:2019-07-02T00:00:00
db:JVNDBid:JVNDB-2017-014573date:2019-07-17T00:00:00
db:PACKETSTORMid:153225date:2019-06-07T15:06:02
db:CNNVDid:CNNVD-201707-1026date:2017-07-24T00:00:00
db:NVDid:CVE-2017-11580date:2019-07-02T21:15:10.010