CVE-2017-17759

Conarc iChannel allows remote attackers to obtain sensitive information, modify the configuration, or cause a denial of service (by deleting the configuration) via a wc.dll?wwMaint~EditConfig request (which reaches an older version of a West Wind Web Connection HTTP service).
References
Link Resource
http://www.information-paradox.net/2017/12/conarc-ichannel-unauthenticated.html Issue Tracking Third Party Advisory
https://www.exploit-db.com/exploits/43377/ Issue Tracking Third Party Advisory VDB Entry
http://www.information-paradox.net/2017/12/conarc-ichannel-unauthenticated.html Issue Tracking Third Party Advisory
https://www.exploit-db.com/exploits/43377/ Issue Tracking Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:conarc:ichannel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () http://www.information-paradox.net/2017/12/conarc-ichannel-unauthenticated.html - Issue Tracking, Third Party Advisory () http://www.information-paradox.net/2017/12/conarc-ichannel-unauthenticated.html - Issue Tracking, Third Party Advisory
References () https://www.exploit-db.com/exploits/43377/ - Issue Tracking, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/43377/ - Issue Tracking, Third Party Advisory, VDB Entry

Information

Published : 2017-12-19 07:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17759

Mitre link : CVE-2017-17759

CVE.ORG link : CVE-2017-17759


JSON object : View

Products Affected

conarc

  • ichannel