CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
9.4 | $0-$5k | 0.00 |
A vulnerability was found in Unitrends Backup up to 9.x (Backup Software) and classified as critical. This issue affects an unknown functionality of the component bpserverd. The manipulation with an unknown input leads to a improper authentication vulnerability. Using CWE to declare the problem leads to CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
It was discovered that the bpserverd proprietary protocol in Unitrends Backup (UB) before 10.0.0, as invoked through xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system.
The bug was discovered 08/07/2017. The weakness was published 08/07/2017 (Website). The advisory is shared at support.unitrends.com. The identification of this vulnerability is CVE-2017-12477 since 08/04/2017. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details are unknown but a public exploit is available.
The exploit is available at exploit-db.com. It is declared as highly functional.
Upgrading to version 10.0.0 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at Exploit-DB (42957). Similar entries are available at 104947 and 104946.
Product
Type
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.6
VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Improper authenticationCWE: CWE-287
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Highly functional
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
OpenVAS ID: 800787
OpenVAS Name: Unitrends RCE Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
MetaSploit ID: ueb9_bpserverd.rb
MetaSploit Name: Unitrends UEB bpserverd authentication bypass RCE
MetaSploit File: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Backup 10.0.0
Timeline
08/04/2017 🔍08/07/2017 🔍
08/07/2017 🔍
08/07/2017 🔍
08/08/2017 🔍
11/04/2019 🔍
Sources
Advisory: support.unitrends.comStatus: Not defined
Confirmation: 🔍
CVE: CVE-2017-12477 (🔍)
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 08/08/2017 12:40Updated: 11/04/2019 14:28
Changes: 08/08/2017 12:40 (68), 11/04/2019 14:28 (5)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.