VAR-201705-3257

Vulnerability from variot - Updated: 2023-12-18 14:05

A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The following versions are affected: Connected Components Workbench - Developer Edition, v9.01.00 and earlier: 9328-CCWDEVENE, 9328-CCWDEVZHE, 9328-CCWDEVFRE, 9328-CCWDEVITE, 9328-CCWDEVDEE, 9328-CCWDEVESE, and 9328-CCWDEVPTE; and Connected Components Workbench - Free Standard Edition (All Supported Languages), v9.01.00 and earlier. Certain DLLs included with versions of CCW software can be potentially hijacked to allow an attacker to gain rights to a victim's affected personal computer. Such access rights can be at the same or potentially higher level of privileges as the compromised user account, including and up to computer administrator privileges. Rockwell Automation Connected Components Workbench Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation Connected Components Workbench is an HMI editor and component-level industrial product for designing and configuring applications and implementing microcontrollers. A local attacker could exploit this vulnerability to execute arbitrary code in the context of a user running in an affected program. The software can be used for controller programming and device configuration, and is integrated with an HMI editor to further simplify stand-alone device programming

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3257",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "connected components workbench",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "9.01.00"
      },
      {
        "model": "connected components workbench software",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "developer edition 9.01.00"
      },
      {
        "model": "connected components workbench software",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "free standard edition (all supported languages) 9.01.00"
      },
      {
        "model": "automation connected components workbench",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "\u003c=v9.01.00"
      },
      {
        "model": "connected components workbench",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "9.01.00"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "connected components workbench",
        "version": "*"
      },
      {
        "model": "automation connected components workbench free standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "??9.1"
      },
      {
        "model": "automation connected components workbench developer edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "??9.1"
      },
      {
        "model": "automation connected components workbench free standard edition",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "??10.01"
      },
      {
        "model": "automation connected components workbench free standard edition",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "??10.00"
      },
      {
        "model": "automation connected components workbench developer edition",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "??10.01"
      },
      {
        "model": "automation connected components workbench developer edition",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "??10.00"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "BID",
        "id": "97000"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:rockwellautomation:connected_components_workbench:*:*:*:*:developer:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "9.01.00",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:rockwellautomation:9328-ccwdevzhe:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:rockwellautomation:9328-ccwdevfre:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:rockwellautomation:9328-ccwdevite:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:rockwellautomation:9328-ccwdevdee:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:rockwellautomation:9328-ccwdevene:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:rockwellautomation:9328-ccwdevese:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:rockwellautomation:9328-ccwdevpte:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:rockwellautomation:connected_components_workbench:*:*:*:*:free_standard:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "9.01.00",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ivan Sanchez",
    "sources": [
      {
        "db": "BID",
        "id": "97000"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-5176",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 6.2,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2017-5176",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.9,
            "id": "CNVD-2017-04296",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.9,
            "id": "efb00b70-253b-4c60-8992-9defd0413fb8",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 1.9,
            "id": "VHN-113379",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:H/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.0,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.0,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-5176",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-5176",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-04296",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201703-965",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "efb00b70-253b-4c60-8992-9defd0413fb8",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-113379",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113379"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The following versions are affected: Connected Components Workbench - Developer Edition, v9.01.00 and earlier: 9328-CCWDEVENE, 9328-CCWDEVZHE, 9328-CCWDEVFRE, 9328-CCWDEVITE, 9328-CCWDEVDEE, 9328-CCWDEVESE, and 9328-CCWDEVPTE; and Connected Components Workbench - Free Standard Edition (All Supported Languages), v9.01.00 and earlier. Certain DLLs included with versions of CCW software can be potentially hijacked to allow an attacker to gain rights to a victim\u0027s affected personal computer. Such access rights can be at the same or potentially higher level of privileges as the compromised user account, including and up to computer administrator privileges. Rockwell Automation Connected Components Workbench Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation Connected Components Workbench is an HMI editor and component-level industrial product for designing and configuring applications and implementing microcontrollers. A local attacker could exploit this vulnerability to execute arbitrary code in the context of a user running in an affected program. The software can be used for controller programming and device configuration, and is integrated with an HMI editor to further simplify stand-alone device programming",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "BID",
        "id": "97000"
      },
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113379"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-5176",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-047-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "97000",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "EFB00B70-253B-4C60-8992-9DEFD0413FB8",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-113379",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113379"
      },
      {
        "db": "BID",
        "id": "97000"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "id": "VAR-201705-3257",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113379"
      }
    ],
    "trust": 1.22692307
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      }
    ]
  },
  "last_update_date": "2023-12-18T14:05:46.954000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Connected Components Workbench Software",
        "trust": 0.8,
        "url": "http://www.rockwellautomation.com/global/support/connected-components/workbench.page"
      },
      {
        "title": "Rockwell Automation Connected Components Workbench DLL loads patches for native code execution vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/91709"
      },
      {
        "title": "Rockwell Automation Connected Components Workbench Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=68694"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-427",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-264",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-113379"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-047-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/97000"
      },
      {
        "trust": 1.4,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5176"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5176"
      },
      {
        "trust": 0.3,
        "url": "http://www.rockwellautomation.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113379"
      },
      {
        "db": "BID",
        "id": "97000"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113379"
      },
      {
        "db": "BID",
        "id": "97000"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-12T00:00:00",
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "date": "2017-04-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "date": "2017-05-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113379"
      },
      {
        "date": "2017-03-22T00:00:00",
        "db": "BID",
        "id": "97000"
      },
      {
        "date": "2017-06-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "date": "2017-05-19T03:29:00.293000",
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "date": "2017-03-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113379"
      },
      {
        "date": "2017-03-23T00:01:00",
        "db": "BID",
        "id": "97000"
      },
      {
        "date": "2017-06-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-004364"
      },
      {
        "date": "2019-10-09T23:28:12.997000",
        "db": "NVD",
        "id": "CVE-2017-5176"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "97000"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation Connected Components Workbench DLL Load Local Code Execution Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-04296"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "efb00b70-253b-4c60-8992-9defd0413fb8"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201703-965"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…