CNVD-2017-22832
Vulnerability from cnvd - Published: 2017-08-25
VLAI Severity ?
Title
多款Marel未授权访问漏洞
Description
Marel是肉类加工行业中拥有先进设备、系统和服务的供应商。
多款Marel未授权访问漏洞,攻击者可利用漏洞访问使用Pluto平台的系统。
Severity
高
Formal description
目前没有详细的解决方案提供: http://marel.com/
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-17-094-02A
Impacted products
| Name | ['Marel Graders using Pluto platform', 'Marel Portioning Machines using Pluto platform', 'Marel Flowline systems using Pluto platform', 'Marel Packing systems using Pluto platform', 'Marel SensorX machines using Pluto platform', 'Marel Target Batchers using Pluto platform', 'Marel SpeedBatchers using Pluto platform'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-9626"
}
},
"description": "Marel\u662f\u8089\u7c7b\u52a0\u5de5\u884c\u4e1a\u4e2d\u62e5\u6709\u5148\u8fdb\u8bbe\u5907\u3001\u7cfb\u7edf\u548c\u670d\u52a1\u7684\u4f9b\u5e94\u5546\u3002\r\n\r\n\u591a\u6b3eMarel\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u8bbf\u95ee\u4f7f\u7528Pluto\u5e73\u53f0\u7684\u7cfb\u7edf\u3002",
"discovererName": "Daniel Lance",
"formalWay": "\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\uff1a \r\nhttp://marel.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-22832",
"openTime": "2017-08-25",
"products": {
"product": [
"Marel Graders using Pluto platform",
"Marel Portioning Machines using Pluto platform",
"Marel Flowline systems using Pluto platform",
"Marel Packing systems using Pluto platform",
"Marel SensorX machines using Pluto platform",
"Marel Target Batchers using Pluto platform",
"Marel SpeedBatchers using Pluto platform"
]
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-17-094-02A",
"serverity": "\u9ad8",
"submitTime": "2017-08-25",
"title": "\u591a\u6b3eMarel\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…