ID

VAR-202010-0410


CVE

CVE-2020-17407


TITLE

Microhard Bullet-LTE  Stack-based buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-012543

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microhard Bullet-LTE prior to v1.2.0-r1112. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of authentication headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10596. Microhard Bullet-LTE Exists in a stack-based buffer overflow vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-10596 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 2.34

sources: NVD: CVE-2020-17407 // JVNDB: JVNDB-2020-012543 // ZDI: ZDI-20-1206 // VULMON: CVE-2020-17407

IOT TAXONOMY

category:['network device']sub_category:gateway

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:microhardcorpmodel:bullet-ltescope:ltversion:1.2.0-r1112

Trust: 1.0

vendor:microhardmodel:bulletltescope:eqversion: -

Trust: 0.8

vendor:microhardmodel:bulletltescope:ltversion:bulletlte firmware 1.2.0-r1112 less than

Trust: 0.8

vendor:microhardmodel:bullet-ltescope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-1206 // JVNDB: JVNDB-2020-012543 // NVD: CVE-2020-17407

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-17407
value: CRITICAL

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2020-17407
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-17407
value: CRITICAL

Trust: 0.8

ZDI: CVE-2020-17407
value: CRITICAL

Trust: 0.7

CNNVD: CNNVD-202010-582
value: CRITICAL

Trust: 0.6

VULMON: CVE-2020-17407
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-17407
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

zdi-disclosures@trendmicro.com: CVE-2020-17407
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2020-17407
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2020-17407
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-1206 // VULMON: CVE-2020-17407 // JVNDB: JVNDB-2020-012543 // CNNVD: CNNVD-202010-582 // NVD: CVE-2020-17407 // NVD: CVE-2020-17407

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-012543 // NVD: CVE-2020-17407

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-582

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202010-582

PATCH

title:Top Pageurl:http://www.microhardcorp.com/index.php

Trust: 0.8

title:Microhard Bullet-LTE Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=130159

Trust: 0.6

sources: JVNDB: JVNDB-2020-012543 // CNNVD: CNNVD-202010-582

EXTERNAL IDS

db:NVDid:CVE-2020-17407

Trust: 3.3

db:ZDIid:ZDI-20-1206

Trust: 3.2

db:JVNDBid:JVNDB-2020-012543

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-10596

Trust: 0.7

db:CNNVDid:CNNVD-202010-582

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2020-17407

Trust: 0.1

sources: OTHER: None // ZDI: ZDI-20-1206 // VULMON: CVE-2020-17407 // JVNDB: JVNDB-2020-012543 // CNNVD: CNNVD-202010-582 // NVD: CVE-2020-17407

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-20-1206/

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-17407

Trust: 1.4

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/121.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/188448

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2020-17407 // JVNDB: JVNDB-2020-012543 // CNNVD: CNNVD-202010-582 // NVD: CVE-2020-17407

CREDITS

Ricky "HeadlessZeke" Lawshae

Trust: 0.7

sources: ZDI: ZDI-20-1206

SOURCES

db:OTHERid: -
db:ZDIid:ZDI-20-1206
db:VULMONid:CVE-2020-17407
db:JVNDBid:JVNDB-2020-012543
db:CNNVDid:CNNVD-202010-582
db:NVDid:CVE-2020-17407

LAST UPDATE DATE

2025-01-30T21:19:22.824000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-1206date:2020-09-17T00:00:00
db:VULMONid:CVE-2020-17407date:2020-10-26T00:00:00
db:JVNDBid:JVNDB-2020-012543date:2021-05-12T07:02:00
db:CNNVDid:CNNVD-202010-582date:2020-10-27T00:00:00
db:NVDid:CVE-2020-17407date:2024-11-21T05:08:02.070

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-1206date:2020-08-26T00:00:00
db:VULMONid:CVE-2020-17407date:2020-10-13T00:00:00
db:JVNDBid:JVNDB-2020-012543date:2021-05-12T00:00:00
db:CNNVDid:CNNVD-202010-582date:2020-10-13T00:00:00
db:NVDid:CVE-2020-17407date:2020-10-13T17:15:13.670