Vulnerability Details : CVE-2016-6567
SHDesigns' Resident Download Manager provides firmware update capabilities for Rabbit 2000/3000 CPU boards, which according to the reporter may be used in some industrial control and embedded applications. The Resident Download Manager does not verify that the firmware is authentic before executing code and deploying the firmware to devices. A remote attacker with the ability to send UDP traffic to the device may be able to execute arbitrary code on the device. According to SHDesigns' website, the Resident Download Manager and other Rabbit Tools have been discontinued since June 2011.
Vulnerability category: Input validationExecute code
Products affected by CVE-2016-6567
- cpe:2.3:a:shdesigns:resident_download_manager:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6567
2.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6567
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-6567
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.Assigned by: cret@cert.org (Secondary)
References for CVE-2016-6567
-
http://www.securityfocus.com/bid/95898
SHDesigns Resident Download Manager CVE-2016-6567 Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
https://www.kb.cert.org/vuls/id/167623
VU#167623 - SHDesigns Resident Download Manager does not authenticate firmware downloadsThird Party Advisory;US Government Resource
Jump to