| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.2 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Cambium ePMP and classified as problematic. The impacted element is an unknown function of the component SNMP. Executing a manipulation as part of Community String can lead to access control. This vulnerability is handled as CVE-2017-7922. The attack can be executed remotely. There is not any exploit available. Changing the configuration settings is recommended.
Details
A vulnerability classified as critical was found in Cambium ePMP (the affected version is unknown). This vulnerability affects an unknown code of the component SNMP. The manipulation as part of a Community String leads to a access control vulnerability. The CWE definition for the vulnerability is CWE-264. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
An Improper Privilege Management issue was discovered in Cambium Networks ePMP. The privileges for SNMP community strings are not properly restricted, which may allow an attacker to gain access to sensitive information and possibly allow for configuration changes.
The bug was discovered 06/15/2017. The weakness was released 06/21/2017 by Karn Ganeshen (Website). The advisory is shared for download at securityfocus.com. This vulnerability was named CVE-2017-7922 since 04/18/2017. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1068.
It is declared as highly functional. The vulnerability was handled as a non-public zero-day exploit for at least 6 days. During that time the estimated underground price was around $0-$5k.
It is possible to mitigate the problem by applying the configuration setting .
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 99083†). Entry connected to this vulnerability is available at VDB-102735. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.4VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.3
VulDB Temp Score: 7.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.6
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 802243
OpenVAS Name: Report default community names of the SNMP Agent
OpenVAS File: 🔍
OpenVAS Family: 🔍
MetaSploit ID: epmp1000_snmp_loot.rb
MetaSploit Name: SNMP Community Login Scanner
MetaSploit File: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: ConfigStatus: 🔍
0-Day Time: 🔍
Timeline
04/18/2017 🔍06/14/2017 🔍
06/15/2017 🔍
06/21/2017 🔍
06/21/2017 🔍
06/22/2017 🔍
10/19/2019 🔍
Sources
Advisory: securityfocus.com⛔Researcher: Karn Ganeshen
Status: Not defined
CVE: CVE-2017-7922 (🔍)
GCVE (CVE): GCVE-0-2017-7922
GCVE (VulDB): GCVE-100-102736
SecurityFocus: 99083 - Cambium Networks ePMP ICSA-17-166-01 Privilege Escalation and Access Bypass Vulnerabilities
See also: 🔍
Entry
Created: 06/22/2017 08:58Updated: 10/19/2019 16:38
Changes: 06/22/2017 08:58 (68), 10/19/2019 16:38 (4)
Complete: 🔍
Cache ID: 216:158:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.