CVE-2017-5168

CVSS V2 Medium 5.1 CVSS V3 High 7.5
Description
An issue was discovered in Hanwha Techwin Smart Security Manager Versions 1.5 and prior. Multiple Path Traversal vulnerabilities have been identified. The flaws exist within the ActiveMQ Broker service that is installed as part of the product. By issuing specific HTTP requests, if a user visits a malicious page, an attacker can gain access to arbitrary files on the server. Smart Security Manager Versions 1.4 and prior to 1.31 are affected by these vulnerabilities. These vulnerabilities can allow for remote code execution.
Overview
  • CVE ID
  • CVE-2017-5168
  • Assigner
  • ics-cert@hq.dhs.gov
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-02-13T21:59:03
  • Last Modified Date
  • 2021-09-13T12:04:36
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:hanwha-security:smart_security_manager:*:*:*:*:*:*:*:* 1 OR 1.5
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:H/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5.1
  • Severity
  • MEDIUM
  • Exploitability Score
  • 4.9
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.6
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/96147 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 16:05:58 Added to TrackCVE
2022-12-02 13:54:46 2017-02-13T21:59Z 2017-02-13T21:59:03 CVE Published Date updated
2022-12-02 13:54:46 2021-09-13T12:04:36 CVE Modified Date updated
2022-12-02 13:54:46 Analyzed Vulnerability Status updated