var-201703-1368
Vulnerability from variot

An issue was discovered in Fatek Automation PLC Ethernet Module. The affected Ether_cfg software configuration tool runs on the following Fatek PLCs: CBEH versions prior to V3.6 Build 170215, CBE versions prior to V3.6 Build 170215, CM55E versions prior to V3.6 Build 170215, and CM25E versions prior to V3.6 Build 170215. A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution or crash the affected device. plural Fatek Automation PLC Ethernet Module Work on Ether_cfg The software configuration tool contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within ether_cfg.exe. The issue lies in the failure to properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Failed attempts will likely cause a denial-of-service condition

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201703-1368",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ethernet module configuration tool cm55e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "fatek",
        "version": "3.5"
      },
      {
        "model": "ethernet module configuration tool cbeh",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "fatek",
        "version": "3.5"
      },
      {
        "model": "ethernet module configuration tool cbe",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "fatek",
        "version": "3.5"
      },
      {
        "model": "ethernet module configuration tool cm25e",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "fatek",
        "version": "3.5"
      },
      {
        "model": "automation plc ethernet module cm55e",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "fatek",
        "version": "0"
      },
      {
        "model": "automation plc ethernet module cbe",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "fatek",
        "version": "0"
      },
      {
        "model": "automation plc ethernet module cbeh",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "fatek",
        "version": "0"
      },
      {
        "model": "automation plc ethernet module cm25e",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "fatek",
        "version": "0"
      },
      {
        "model": "plc ethernet module cbe",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "fatek automation",
        "version": "3.6 build 170215"
      },
      {
        "model": "plc ethernet module cbeh",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "fatek automation",
        "version": "3.6 build 170215"
      },
      {
        "model": "plc ethernet module cm25e",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "fatek automation",
        "version": "3.6 build 170215"
      },
      {
        "model": "plc ethernet module cm55e",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "fatek automation",
        "version": "3.6 build 170215"
      },
      {
        "model": "plc ethernet module configuration tool",
        "scope": null,
        "trust": 0.7,
        "vendor": "fatek automation",
        "version": null
      },
      {
        "model": "ethernet module configuration tool cbe",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "fatek automation",
        "version": "3.5"
      },
      {
        "model": "ethernet module configuration tool cm55e",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "fatek automation",
        "version": "3.5"
      },
      {
        "model": "ethernet module configuration tool cbeh",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "fatek automation",
        "version": "3.5"
      },
      {
        "model": "ethernet module configuration tool cm25e",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "fatek automation",
        "version": "3.5"
      },
      {
        "model": "automation plc ethernet module cm55e build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "fatek",
        "version": "3.6170215"
      },
      {
        "model": "automation plc ethernet module cm25e build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "fatek",
        "version": "3.6170215"
      },
      {
        "model": "automation plc ethernet module cbeh build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "fatek",
        "version": "3.6170215"
      },
      {
        "model": "automation plc ethernet module cbe build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "fatek",
        "version": "3.6170215"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ethernet module configuration tool cbe",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ethernet module configuration tool cbeh",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ethernet module configuration tool cm25e",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ethernet module configuration tool cm55e",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "BID",
        "id": "96892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:fatek:ethernet_module_configuration_tool_cbe_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:fatek:ethernet_module_configuration_tool_cbeh_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:fatek:ethernet_module_configuration_tool_cm25e_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:fatek:ethernet_module_configuration_tool_cm55e_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Anonymous",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2017-6023",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-6023",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2017-6023",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-05066",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "67382430-e896-4ad0-9272-f55e1fb83a21",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-114226",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-6023",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-6023",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-6023",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-6023",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "ZDI",
            "id": "CVE-2017-6023",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-05066",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201702-589",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "67382430-e896-4ad0-9272-f55e1fb83a21",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-114226",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Fatek Automation PLC Ethernet Module. The affected Ether_cfg software configuration tool runs on the following Fatek PLCs: CBEH versions prior to V3.6 Build 170215, CBE versions prior to V3.6 Build 170215, CM55E versions prior to V3.6 Build 170215, and CM25E versions prior to V3.6 Build 170215. A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution or crash the affected device. plural Fatek Automation PLC Ethernet Module Work on Ether_cfg The software configuration tool contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within ether_cfg.exe.  The issue lies in the failure to properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer.  An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Failed attempts will likely cause a denial-of-service condition",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-6023"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "BID",
        "id": "96892"
      },
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114226"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-6023",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-073-01",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "96892",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3706",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-465",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "67382430-E896-4AD0-9272-F55E1FB83A21",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-114226",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114226"
      },
      {
        "db": "BID",
        "id": "96892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "id": "VAR-201703-1368",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114226"
      }
    ],
    "trust": 1.65
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:05:28.316000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.fatek.com/en/"
      },
      {
        "title": "Fatek Automation has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-073-01"
      },
      {
        "title": "Patch for Fatek Automation PLC Ethernet Module Stack Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/92381"
      },
      {
        "title": "Multiple Fatek Automation PLC Product Buffer Error Vulnerability Fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99645"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-121",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-073-01"
      },
      {
        "trust": 2.9,
        "url": "http://www.securityfocus.com/bid/96892"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6023"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6023"
      },
      {
        "trust": 0.3,
        "url": "http://www.fatek.com/en/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114226"
      },
      {
        "db": "BID",
        "id": "96892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114226"
      },
      {
        "db": "BID",
        "id": "96892"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-22T00:00:00",
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "date": "2017-04-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "date": "2017-03-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114226"
      },
      {
        "date": "2017-03-14T00:00:00",
        "db": "BID",
        "id": "96892"
      },
      {
        "date": "2017-04-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "date": "2017-02-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      },
      {
        "date": "2017-03-16T04:59:00.153000",
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-17-465"
      },
      {
        "date": "2017-04-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114226"
      },
      {
        "date": "2017-03-16T01:02:00",
        "db": "BID",
        "id": "96892"
      },
      {
        "date": "2017-04-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-002740"
      },
      {
        "date": "2021-11-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      },
      {
        "date": "2024-11-21T03:28:55.470000",
        "db": "NVD",
        "id": "CVE-2017-6023"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Fatek Automation PLC Ethernet Module Stack Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05066"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "67382430-e896-4ad0-9272-f55e1fb83a21"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-589"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…