VAR-201805-0355

Vulnerability from variot - Updated: 2023-12-18 12:18

In ABB SREA-01 revisions A, B, C: application versions up to 3.31.5, and SREA-50 revision A: application versions up to 3.32.8, an attacker may access internal files of ABB SREA-01 and SREA-50 legacy remote monitoring tools without any authorization over the network using a HTTP request which refers to files using ../../ relative paths. Once the internal password file is retrieved, the password hash can be identified using a brute force attack. There is also an exploit allowing running of commands after authorization. ABB SREA-01 and SREA-50 Contains a path traversal vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both ABBSREA-01 and SREA-50 are inverter adapters from Asea Brown Boveri (ABB), Switzerland. A directory traversal vulnerability exists in ABBSREA-01 and SREA-50. An attacker who successfully exploited the vulnerability could access files on the file system of the affected product, view the data, change the configuration, retrieve the password hash code, and send commands to connect to Authorized device. ABB SREA-01 and SREA-50 are prone to a directory-traversal vulnerability. Remote attackers may use a specially crafted request with directory-traversal sequences ('../') to retrieve sensitive information. This may aid in further attacks. The following products are affected: SREA-01 revisions A, B, C version 3.31.5 and prior. SREA-50 revision A version 3.32.8 and prior

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0355",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "srea-01",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "abb",
        "version": "3.31.5"
      },
      {
        "model": "srea-50",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "abb",
        "version": "3.32.8"
      },
      {
        "model": "srea-01",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "abb",
        "version": "\u003c=3.31.5"
      },
      {
        "model": "srea-50",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "abb",
        "version": "\u003c=3.32.8"
      },
      {
        "model": "srea-01",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "abb",
        "version": "3.31.5"
      },
      {
        "model": "srea-50",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "abb",
        "version": "3.32.8"
      },
      {
        "model": "srea-50 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "3.32.8"
      },
      {
        "model": "srea-01 c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "3.31.5"
      },
      {
        "model": "srea-01 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "3.31.5"
      },
      {
        "model": "srea-01 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "abb",
        "version": "3.31.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "srea 50",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "srea 01",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "BID",
        "id": "100260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:abb:srea-50_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.32.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:abb:srea-50:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:abb:srea-01_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.31.5",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:abb:srea-01:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Bertin Jose and Fernandez Ezequiel",
    "sources": [
      {
        "db": "BID",
        "id": "100260"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-9664",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2017-9664",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-22843",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-117867",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-9664",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-9664",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-22843",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201706-573",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-117867",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117867"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In ABB SREA-01 revisions A, B, C: application versions up to 3.31.5, and SREA-50 revision A: application versions up to 3.32.8, an attacker may access internal files of ABB SREA-01 and SREA-50 legacy remote monitoring tools without any authorization over the network using a HTTP request which refers to files using ../../ relative paths. Once the internal password file is retrieved, the password hash can be identified using a brute force attack. There is also an exploit allowing running of commands after authorization. ABB SREA-01 and SREA-50 Contains a path traversal vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both ABBSREA-01 and SREA-50 are inverter adapters from Asea Brown Boveri (ABB), Switzerland. A directory traversal vulnerability exists in ABBSREA-01 and SREA-50. An attacker who successfully exploited the vulnerability could access files on the file system of the affected product, view the data, change the configuration, retrieve the password hash code, and send commands to connect to Authorized device. ABB SREA-01 and SREA-50 are prone to a directory-traversal vulnerability. \nRemote attackers may use a specially crafted request with directory-traversal sequences (\u0027../\u0027) to retrieve sensitive information. This may aid in further attacks. \nThe following products are affected:\nSREA-01 revisions A, B, C version 3.31.5 and prior. \nSREA-50 revision A version 3.32.8 and prior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "BID",
        "id": "100260"
      },
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117867"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-9664",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-222-05",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "100260",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "4FDFE066-CC27-4BE8-9FF4-ECEE3B2345EE",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-117867",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117867"
      },
      {
        "db": "BID",
        "id": "100260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "id": "VAR-201805-0355",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117867"
      }
    ],
    "trust": 1.5
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:18:51.382000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SREA-01",
        "trust": 0.8,
        "url": "https://new.abb.com/products/temp.fidri3aua0000039179"
      },
      {
        "title": "SREA-50",
        "trust": 0.8,
        "url": "https://new.abb.com/products/abb3axd50000000263"
      },
      {
        "title": "ABBSREA-01 and SREA-50 have patches for directory traversal vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/100829"
      },
      {
        "title": "ABB SREA-01  and SREA-50 Repair measures for path traversal vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=99845"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-117867"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-222-05"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/100260"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9664"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9664"
      },
      {
        "trust": 0.3,
        "url": "http://www.abb.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117867"
      },
      {
        "db": "BID",
        "id": "100260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117867"
      },
      {
        "db": "BID",
        "id": "100260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-25T00:00:00",
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "date": "2017-08-11T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "date": "2018-05-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-117867"
      },
      {
        "date": "2017-08-10T00:00:00",
        "db": "BID",
        "id": "100260"
      },
      {
        "date": "2018-07-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "date": "2018-05-24T20:29:00.257000",
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "date": "2017-06-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-22843"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-117867"
      },
      {
        "date": "2017-08-10T00:00:00",
        "db": "BID",
        "id": "100260"
      },
      {
        "date": "2018-07-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      },
      {
        "date": "2019-10-09T23:30:47.580000",
        "db": "NVD",
        "id": "CVE-2017-9664"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ABB SREA-01 and  SREA-50 Path traversal vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-013494"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Path traversal",
    "sources": [
      {
        "db": "IVD",
        "id": "4fdfe066-cc27-4be8-9ff4-ecee3b2345ee"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-573"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…