Vulnerability Details : CVE-2017-9644
An Unquoted Search Path or Element issue was discovered in Automated Logic Corporation (ALC) ALC WebCTRL, i-Vu, SiteScan Web 6.5 and prior; ALC WebCTRL, SiteScan Web 6.1 and prior; ALC WebCTRL, i-Vu 6.0 and prior; ALC WebCTRL, i-Vu, SiteScan Web 5.5 and prior; and ALC WebCTRL, i-Vu, SiteScan Web 5.2 and prior. An unquoted search path vulnerability may allow a non-privileged local attacker to change files in the installation directory and execute arbitrary code with elevated privileges.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2017-9644
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 16 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-9644
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
7.0
|
HIGH | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2017-9644
-
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.Assigned by:
- ics-cert@hq.dhs.gov (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2017-9644
-
http://www.securityfocus.com/bid/100454
Multiple Automated Logic Corporation Products CVE-2017-9644 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
https://ics-cert.us-cert.gov/advisories/ICSA-17-234-01
Automated Logic Corporation WebCTRL, i-VU, SiteScan | CISAMitigation;Third Party Advisory;US Government Resource
-
https://www.exploit-db.com/exploits/42542/
Automated Logic WebCTRL 6.5 - Local Privilege EscalationThird Party Advisory;VDB Entry
Products affected by CVE-2017-9644
- cpe:2.3:a:automatedlogic:sitescan_web:*:*:*:*:*:*:*:*
- cpe:2.3:a:automatedlogic:sitescan_web:*:*:*:*:*:*:*:*
- cpe:2.3:a:automatedlogic:sitescan_web:*:*:*:*:*:*:*:*
- cpe:2.3:a:automatedlogic:sitescan_web:*:*:*:*:*:*:*:*
- cpe:2.3:a:automatedlogic:i-vu:*:*:*:*:*:*:*:*
- cpe:2.3:a:automatedlogic:i-vu:*:*:*:*:*:*:*:*
- cpe:2.3:a:automatedlogic:i-vu:*:*:*:*:*:*:*:*
- cpe:2.3:a:automatedlogic:i-vu:*:*:*:*:*:*:*:*
- cpe:2.3:a:carrier:automatedlogic_webctrl:*:*:*:*:*:*:*:*
- cpe:2.3:a:carrier:automatedlogic_webctrl:*:*:*:*:*:*:*:*
- cpe:2.3:a:carrier:automatedlogic_webctrl:*:*:*:*:*:*:*:*
- cpe:2.3:a:carrier:automatedlogic_webctrl:*:*:*:*:*:*:*:*
- cpe:2.3:a:carrier:automatedlogic_webctrl:*:*:*:*:*:*:*:*