var-201702-0696
Vulnerability from variot

An issue was discovered in Carlo Gavazzi VMU-C EM prior to firmware Version A11_U05, and VMU-C PV prior to firmware Version A17. The access control flaw allows access to most application functions without authentication. CarloGavazziAutomationVMU-CEM and VMU-CPV are control modules in the automation products of Italy's CarloGavazzi Automation. There are unauthorized access vulnerabilities in CarloGavazziAutomationVMU-CEM and VMU-CPV. An unauthenticated attacker exploits a vulnerability to access a device and obtain sensitive information to perform unauthorized operations. Multiple Carlo Gavazzi products are prone to an unauthorized-access vulnerability, a cross-site request-forgery vulnerability and an information-disclosure vulnerability. Other attacks are also possible. An attacker could exploit this vulnerability to change configuration parameters. VMU-C Web-Server solution for photovoltaic applications

VMU-C EM is a data logger system for small to medium projects, VMUC-Y EM is a hardware data aggregator for medium to larger projects and Em2 Server is a software solution for large projects. They are designed to complement the extensive line of Carlo Gavazzi energy meters and current transformers. Weak Credentials Management* -> admin/admin -> Application does not enforce mandatory password change

2. Sensitive Information stored in clear-text Accounts menu option a shows username and password a passwords shown in clear-text a SMTP server password a user and service passwords are stored in clear-text

*3. Application stores the Energy / Plant data in a sqlite database - EWPlant.db. Anyone can dump plant database file - without any authentication

4. Reflected + Stored XSS - multiple URLs, parameters - Not documented in ICS-CERT Advisory

Successful exploitation of this vulnerability could allow an unauthenticated attacker to inject arbitrary JavaScript in a specially crafted URL request where the response containing user data is returned to the web browser without being made safe to display.

5. Vulnerable to Cross-Site Request Forgery

There is no CSRF Token generated per page and / or per (sensitive) function. Successful exploitation of this vulnerability can allow silent execution of unauthorized actions on the device such as configuration parameter changes, and saving modified configuration.

+++++

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0696",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "vmu-c pv",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "carlosgavazzi",
        "version": null
      },
      {
        "model": "vmu-c em",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "carlosgavazzi",
        "version": null
      },
      {
        "model": "vmu-c em",
        "scope": null,
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": null
      },
      {
        "model": "vmu-c em",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": "a11_u05"
      },
      {
        "model": "vmu-c pv",
        "scope": null,
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": null
      },
      {
        "model": "vmu-c pv",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": "a17"
      },
      {
        "model": "gavazzi vmu-c em \u003ca11 u05",
        "scope": null,
        "trust": 0.6,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": "gavazzi vmu-c pv \u003ca17",
        "scope": null,
        "trust": 0.6,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": "gavazzi vmu-c pv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "carlo",
        "version": "0"
      },
      {
        "model": "gavazzi vmu-c em",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "carlo",
        "version": "0"
      },
      {
        "model": "gavazzi vmu-c pv a17",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": "gavazzi vmu-c em a11 u05",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vmu c em",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "vmu c pv",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:carlosgavazzi:vmu-c_em",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:carlosgavazzi:vmu-c_em_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:carlosgavazzi:vmu-c_pv",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:carlosgavazzi:vmu-c_pv_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Karn Ganeshen",
    "sources": [
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2017-5144",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-5144",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-00493",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-113347",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-5144",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-5144",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-5144",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-00493",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201701-323",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-113347",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-5144",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Carlo Gavazzi VMU-C EM prior to firmware Version A11_U05, and VMU-C PV prior to firmware Version A17. The access control flaw allows access to most application functions without authentication. CarloGavazziAutomationVMU-CEM and VMU-CPV are control modules in the automation products of Italy\u0027s CarloGavazzi Automation. There are unauthorized access vulnerabilities in CarloGavazziAutomationVMU-CEM and VMU-CPV. An unauthenticated attacker exploits a vulnerability to access a device and obtain sensitive information to perform unauthorized operations. Multiple Carlo Gavazzi products are prone to an unauthorized-access vulnerability, a cross-site request-forgery vulnerability and an information-disclosure vulnerability. Other attacks are also possible. An attacker could exploit this vulnerability to change configuration parameters. *VMU-C Web-Server solution for photovoltaic applications*\n\nVMU-C EM is a data logger system for small to medium projects, VMUC-Y EM is\na hardware data aggregator for medium to larger projects and Em2 Server is\na software solution for large projects. They are designed to complement the\nextensive line of Carlo Gavazzi energy meters and current transformers. Weak Credentials Management*\n-\u003e admin/admin\n-\u003e Application does not enforce mandatory password change\n\n*2. Sensitive Information stored in clear-text*\nAccounts menu option\na shows username and password\na passwords shown in clear-text\na SMTP server password\na user and service passwords are stored in clear-text\n\n*3. Application stores the Energy / Plant data in a sqlite database -\n   EWPlant.db. Anyone can dump plant database file - without any authentication\n\n*4. Reflected + Stored XSS - multiple URLs, parameters - *Not documented in\nICS-CERT Advisory\n\nSuccessful exploitation of this vulnerability could allow an\nunauthenticated attacker to inject arbitrary JavaScript in a specially\ncrafted URL request where the response containing user data is returned to\nthe web browser without being made safe to display. \n\n*5. Vulnerable to Cross-Site Request Forgery*\n\nThere is no CSRF Token generated per page and / or per (sensitive)\nfunction. Successful exploitation of this vulnerability can allow silent\nexecution of unauthorized actions on the device such as configuration\nparameter changes, and saving modified configuration. \n\n+++++\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5144"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5144"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      }
    ],
    "trust": 2.88
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-113347",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-5144",
        "trust": 3.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-012-03",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "95411",
        "trust": 2.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "EADFDC14-C159-4F57-9A2C-1D1755E16E30",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "142045",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-113347",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5144",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5144"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "id": "VAR-201702-0696",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      }
    ],
    "trust": 1.775
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:41:47.136000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.productselection.net/"
      },
      {
        "title": "CarloGavazziAutomationVMU-CEM and VMU-CPV have patches for unauthorized access vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/88075"
      },
      {
        "title": "Carlo Gavazzi Automation VMU-C EM  and VMU-C PV Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66989"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-284",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-012-03"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/95411"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5144"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-5144"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/95411/info"
      },
      {
        "trust": 0.3,
        "url": "http://www.carlogavazzi.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5145"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5144"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5146"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5144"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-5144"
      },
      {
        "db": "BID",
        "id": "95411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-17T00:00:00",
        "db": "IVD",
        "id": "eadfdc14-c159-4f57-9a2c-1d1755e16e30"
      },
      {
        "date": "2017-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-5144"
      },
      {
        "date": "2017-01-12T00:00:00",
        "db": "BID",
        "id": "95411"
      },
      {
        "date": "2017-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "date": "2017-04-06T18:22:22",
        "db": "PACKETSTORM",
        "id": "142045"
      },
      {
        "date": "2017-01-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      },
      {
        "date": "2017-02-13T21:59:02.533000",
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-00493"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113347"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-5144"
      },
      {
        "date": "2017-01-23T04:05:00",
        "db": "BID",
        "id": "95411"
      },
      {
        "date": "2017-03-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      },
      {
        "date": "2024-11-21T03:27:08.837000",
        "db": "NVD",
        "id": "CVE-2017-5144"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Carlo Gavazzi VMU-C EM and  VMU-C PV Vulnerability to access application functions without authentication in firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-001713"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-323"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…