CNVD-2017-22838

Vulnerability from cnvd - Published: 2017-08-25
VLAI Severity ?
Title
Mirion Technologies Telemetry Enabled Devices拒绝服务漏洞
Description
Mirion Technologies为核能,军事,辐射探测和监测提供解决方案的来源。 Mirion Technologies Telemetry Enabled Devices拒绝服务漏洞,攻击者可利用该漏洞传送欺诈性数据或执行拒绝服务。
Severity
Patch Name
Mirion Technologies Telemetry Enabled Devices拒绝服务漏洞的补丁
Patch Description
Mirion Technologies为核能,军事,辐射探测和监测提供解决方案的来源。 Mirion Technologies Telemetry Enabled Devices拒绝服务漏洞,攻击者可利用该漏洞传送欺诈性数据或执行拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页: http://www.mirion.com/

Reference
https://ics-cert.us-cert.gov/advisories/ICSA-17-208-02
Impacted products
Name
['Mirion Technologies Telemetry Enabled Devices DMC 3000 Transmitter Module', 'Mirion Technologies Telemetry Enabled Devices iPam Transmitter f/DMC 2000', 'Mirion Technologies Telemetry Enabled Devices RDS-31 iTX and variants (incl. RSD31-AM Package)', 'Mirion Technologies Telemetry Enabled Devices DRM-1/2 and variants (incl. Solar PWR Package)', 'Mirion Technologies Telemetry Enabled Devices DRM and RDS Based Boundary Monitors', 'Mirion Technologies Telemetry Enabled Devices Telepole II', 'Mirion Technologies Telemetry Enabled Devices External Transmitters', 'Mirion Technologies Telemetry Enabled Devices MESH Repeater']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-9649"
    }
  },
  "description": "Mirion Technologies\u4e3a\u6838\u80fd\uff0c\u519b\u4e8b\uff0c\u8f90\u5c04\u63a2\u6d4b\u548c\u76d1\u6d4b\u63d0\u4f9b\u89e3\u51b3\u65b9\u6848\u7684\u6765\u6e90\u3002\r\n\r\nMirion Technologies Telemetry Enabled Devices\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f20\u9001\u6b3a\u8bc8\u6027\u6570\u636e\u6216\u6267\u884c\u62d2\u7edd\u670d\u52a1\u3002",
  "discovererName": "Ruben Santamarta of IOActive",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a \r\nhttp://www.mirion.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-22838",
  "openTime": "2017-08-25",
  "patchDescription": "Mirion Technologies\u4e3a\u6838\u80fd\uff0c\u519b\u4e8b\uff0c\u8f90\u5c04\u63a2\u6d4b\u548c\u76d1\u6d4b\u63d0\u4f9b\u89e3\u51b3\u65b9\u6848\u7684\u6765\u6e90\u3002\r\n\r\nMirion Technologies Telemetry Enabled Devices\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f20\u9001\u6b3a\u8bc8\u6027\u6570\u636e\u6216\u6267\u884c\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Mirion Technologies Telemetry Enabled Devices\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Mirion Technologies Telemetry Enabled Devices DMC 3000 Transmitter Module",
      "Mirion Technologies Telemetry Enabled Devices iPam Transmitter f/DMC 2000",
      "Mirion Technologies Telemetry Enabled Devices RDS-31 iTX and variants (incl. RSD31-AM Package)",
      "Mirion Technologies Telemetry Enabled Devices DRM-1/2 and variants (incl. Solar PWR Package)",
      "Mirion Technologies Telemetry Enabled Devices DRM and RDS Based Boundary Monitors",
      "Mirion Technologies Telemetry Enabled Devices Telepole II",
      "Mirion Technologies Telemetry Enabled Devices External Transmitters",
      "Mirion Technologies Telemetry Enabled Devices MESH Repeater"
    ]
  },
  "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-02",
  "serverity": "\u4e2d",
  "submitTime": "2017-08-03",
  "title": "Mirion Technologies Telemetry Enabled Devices\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…