eCos Embedded Web Server における認証に関する脆弱性
| Title |
eCos Embedded Web Server における認証に関する脆弱性
|
| Summary |
eCos Embedded Web Server には、認証に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
July 17, 2017, midnight |
| Registration Date |
Sept. 7, 2017, 5:22 p.m. |
| Last Update |
Sept. 7, 2017, 5:22 p.m. |
|
CVSS3.0 : 緊急
|
| Score |
9.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
10
|
| Vector |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| eCos |
|
eCos Embedded Web Server
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2017年09月07日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2017-1000020
| Summary |
SYN Flood or FIN Flood attack in ECos 1 and other versions embedded devices results in web Authentication Bypass. "eCos Embedded Web Servers used by Multiple Routers and Home devices, while sending SYN Flood or FIN Flood packets fails to validate and handle the packets and does not ask for any sign of authentication resulting in Authentication Bypass. An attacker can take complete advantage of this bug and take over the device remotely or locally. The bug has been successfully tested and reproduced in some versions of SOHO Routers manufactured by TOTOLINK, GREATEK and others."
|
| Publication Date |
July 17, 2017, 10:18 p.m. |
| Registration Date |
Jan. 26, 2021, 1:11 p.m. |
| Last Update |
Nov. 21, 2024, 12:03 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:ecos:embedded_web_servers:*:*:*:*:*:*:*:* |
|
1.3.1 |
|
|
| execution environment |
| 1 |
cpe:2.3:h:greatek:soho:-:*:*:*:*:*:*:* |
| 2 |
cpe:2.3:h:totolink:soho:-:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List