VAR-201706-0465
Vulnerability from variot - Updated: 2023-12-18 12:43An Unrestricted Upload issue was discovered in Marel Food Processing Systems M3000 terminal associated with the following systems: A320, A325, A371, A520 Master, A520 Slave, A530, A542, A571, Check Bin Grader, FlowlineQC T376, IPM3 Dual Cam v132, IPM3 Dual Cam v139, IPM3 Single Cam v132, P520, P574, SensorX13 QC flow line, SensorX23 QC Master, SensorX23 QC Slave, Speed Batcher, T374, T377, V36, V36B, and V36C; M3210 terminal associated with the same systems as the M3000 terminal identified above; M3000 desktop software associated with the same systems as the M3000 terminal identified above; MAC4 controller associated with the same systems as the M3000 terminal identified above; SensorX23 X-ray machine; SensorX25 X-ray machine; and MWS2 weighing system. This vulnerability allows an attacker to modify the operation and upload firmware changes without detection. plural Marel Food Processing System The product firmware contains a vulnerability related to the unlimited uploading of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MarelSensorX25X-rayMachine and others are products of the medical industry of Iceland Marel that provide various medical tests. There are arbitrary file upload vulnerabilities in MarelFoodProcessingSystems in several Marel products. Marel Food Processing Systems are prone to following security vulnerabilities: 1. A security-bypass vulnerability. 2. Marel SensorX25 X-ray Machine, etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0465",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "a530",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a325",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "ipm3 dual cam",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": "132"
},
{
"model": "p520",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "sensorx13 qc flow line",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a520 master",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a520 slave",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "p574",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a371",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a320",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a542",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "check bin grader",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "ipm3 dual cam",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": "139"
},
{
"model": "sensorx23 qc slave",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "t374",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "t377",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "flowlineqc t376",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 qc master",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "v36c",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "v36",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "a571",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "v36b",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "speed batcher",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "a320",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a325",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a371",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a520 master",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a520 slave",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a530",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a542",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a571",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "check bin grader",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "flowlineqc t376",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "ipm3 dual cam",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "ipm3 single cam",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "p520",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "p574",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx13 qc flow line",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 qc master",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 qc slave",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "speed batcher",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "t374",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "t377",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "v36",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "v36b",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "v36c",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx25 x-ray machine",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 x-ray machine",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "mws2 weighing system",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "mac4 controller",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "m3210 termina",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "m3000 termina",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ipm3 dual cam",
"version": "132"
},
{
"model": "sensorx25 x-ray machine",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "sensorx23 x-ray machine",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "mws2 weighing system",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "mac4 controller",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "m3210 terminal",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "m3000 terminal",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a320",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "flowlineqc t376",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ipm3 dual cam",
"version": "139"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "p520",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "p574",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sensorx13 qc flow line",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sensorx23 qc master",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sensorx23 qc slave",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "speed batcher",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a325",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "t374",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "t377",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "v36",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "v36b",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "v36c",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a371",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a520 master",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a520 slave",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a530",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a542",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a571",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "check bin grader",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a325_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a325:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a371_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a371:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a520_master_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a520_master:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a520_slave_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a520_slave:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a530_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a542_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a542:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a571_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a571:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:check_bin_grader_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:check_bin_grader:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:flowlineqc_t376_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:flowlineqc_t376:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:ipm3_dual_cam_firmware:132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:ipm3_dual_cam:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:ipm3_dual_cam_firmware:139:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:ipm3_dual_cam:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:ipm3_dual_cam_firmware:132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:ipm3_dual_cam:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:p520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:p520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:p574_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:p574:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:sensorx13_qc_flow_line_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:sensorx13_qc_flow_line:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:sensorx23_qc_master_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:sensorx23_qc_master:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:sensorx23_qc_slave_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:sensorx23_qc_slave:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:speed_batcher_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:speed_batcher:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:t374_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:t374:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:t377_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:t377:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:v36_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:v36:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:v36b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:v36b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:v36c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:v36c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6041"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Daniel Lance",
"sources": [
{
"db": "BID",
"id": "97388"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
],
"trust": 0.9
},
"cve": "CVE-2017-6041",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2017-6041",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-05777",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "688c5c78-70ee-4494-8465-824cb5226abf",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-114244",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-6041",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-6041",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2017-05777",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-318",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-114244",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"db": "VULHUB",
"id": "VHN-114244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Unrestricted Upload issue was discovered in Marel Food Processing Systems M3000 terminal associated with the following systems: A320, A325, A371, A520 Master, A520 Slave, A530, A542, A571, Check Bin Grader, FlowlineQC T376, IPM3 Dual Cam v132, IPM3 Dual Cam v139, IPM3 Single Cam v132, P520, P574, SensorX13 QC flow line, SensorX23 QC Master, SensorX23 QC Slave, Speed Batcher, T374, T377, V36, V36B, and V36C; M3210 terminal associated with the same systems as the M3000 terminal identified above; M3000 desktop software associated with the same systems as the M3000 terminal identified above; MAC4 controller associated with the same systems as the M3000 terminal identified above; SensorX23 X-ray machine; SensorX25 X-ray machine; and MWS2 weighing system. This vulnerability allows an attacker to modify the operation and upload firmware changes without detection. plural Marel Food Processing System The product firmware contains a vulnerability related to the unlimited uploading of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MarelSensorX25X-rayMachine and others are products of the medical industry of Iceland Marel that provide various medical tests. There are arbitrary file upload vulnerabilities in MarelFoodProcessingSystems in several Marel products. Marel Food Processing Systems are prone to following security vulnerabilities:\n1. A security-bypass vulnerability. \n2. Marel SensorX25 X-ray Machine, etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "VULHUB",
"id": "VHN-114244"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6041",
"trust": 3.6
},
{
"db": "BID",
"id": "97388",
"trust": 2.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-094-02",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-05777",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-17-094-02B",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286",
"trust": 0.8
},
{
"db": "IVD",
"id": "688C5C78-70EE-4494-8465-824CB5226ABF",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-114244",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"db": "VULHUB",
"id": "VHN-114244"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
]
},
"id": "VAR-201706-0465",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"db": "VULHUB",
"id": "VHN-114244"
}
],
"trust": 1.7888888666666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "CNVD",
"id": "CNVD-2017-05777"
}
]
},
"last_update_date": "2023-12-18T12:43:36.285000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://marel.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-434",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"db": "NVD",
"id": "CVE-2017-6041"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/97388"
},
{
"trust": 1.7,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-02"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6041"
},
{
"trust": 0.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-02b"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6041"
},
{
"trust": 0.3,
"url": "http://marel.com/"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-02 "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"db": "VULHUB",
"id": "VHN-114244"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"db": "VULHUB",
"id": "VHN-114244"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-02T00:00:00",
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"date": "2017-05-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"date": "2017-06-30T00:00:00",
"db": "VULHUB",
"id": "VHN-114244"
},
{
"date": "2017-04-04T00:00:00",
"db": "BID",
"id": "97388"
},
{
"date": "2017-07-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"date": "2017-06-30T03:29:00.563000",
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"date": "2017-04-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05777"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-114244"
},
{
"date": "2017-04-11T00:02:00",
"db": "BID",
"id": "97388"
},
{
"date": "2017-07-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005286"
},
{
"date": "2019-10-09T23:28:37.043000",
"db": "NVD",
"id": "CVE-2017-6041"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Marel Food Processing System Unsafe upload of dangerous file types in product firmware vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005286"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Code problem",
"sources": [
{
"db": "IVD",
"id": "688c5c78-70ee-4494-8465-824cb5226abf"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-318"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.