Vulnerability Details : CVE-2017-15653
Improper administrator IP validation after his login in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allows an unauthorized user to execute any action knowing administrator session token by using a specific User-Agent string.
Products affected by CVE-2017-15653
- cpe:2.3:a:asus:asuswrt:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-15653
0.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-15653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-15653
-
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-15653
-
http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-Hijacking-Information-Disclosure.html
ASUSWRT 3.0.0.4.382.18495 Session Hijacking / Information Disclosure ≈ Packet StormThird Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2018/Jan/63
Full Disclosure: Multiple vulnerabilities in all versions of ASUS routersMailing List;Third Party Advisory
Jump to