CVE-2017-5170

An Uncontrolled Search Path Element issue was discovered in Moxa SoftNVR-IA Live Viewer, Version 3.30.3122 and prior versions. An uncontrolled search path element (DLL Hijacking) vulnerability has been identified. To exploit this vulnerability, an attacker could rename a malicious DLL to meet the criteria of the application, and the application would not verify that the DLL is correct. The attacker needs to have administrative access to the default install location in order to plant the insecure DLL. Once loaded by the application, the DLL could run malicious code at the privilege level of the application.
References
Link Resource
http://www.securityfocus.com/bid/100208 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-17-220-02 Mitigation Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/100208 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-17-220-02 Mitigation Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:moxa:softnvr-ia_live_view:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100208 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100208 - Third Party Advisory, VDB Entry
References () https://ics-cert.us-cert.gov/advisories/ICSA-17-220-02 - Mitigation, Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-17-220-02 - Mitigation, Third Party Advisory, US Government Resource

Information

Published : 2018-01-18 19:29

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5170

Mitre link : CVE-2017-5170

CVE.ORG link : CVE-2017-5170


JSON object : View

Products Affected

moxa

  • softnvr-ia_live_view
CWE
CWE-427

Uncontrolled Search Path Element