7.3
CVSSv3

CVE-2017-9606

Published: 15/06/2017 Updated: 03/10/2019
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.3 | Impact Score: 5.9 | Exploitability Score: 1.3
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Infotecs ViPNet Client and Coordinator prior to 4.3.2-42442 allow local users to gain privileges by placing a Trojan horse ViPNet update file in the update folder. The attack succeeds because of incorrect folder permissions in conjunction with a lack of integrity and authenticity checks.

Vulnerable Product Search on Vulmon Subscribe to Product

infotecs vipnet client

infotecs vipnet coordinator

Github Repositories

CVE-2017-9606 Due to insufficient of checking integrity, authenticity and low user rights on update folder local user can craft fake ViPNet update files with arbitrary execution code and place them in ViPNet update folder After placing fake update files in ViPNet update folder, ViPNet update system executes them with system or local admin rights 3x - With local admin rights 4