CVE-2017-13083
low-risk
Published 2017-10-18
Akeo Consulting Rufus prior to version 2.17.1187 does not adequately validate the integrity of updates downloaded over HTTP, allowing an attacker to easily convince a user to execute arbitrary code
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Rufus
Affected Vendors
References (8)
Third Party Advisory
http://www.kb.cert.org/vuls/id/403768
Third Party Advisory
http://www.securityfocus.com/bid/100516
Third Party Advisory
https://github.com/pbatard/rufus/commit/c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb
Third Party Advisory
https://github.com/pbatard/rufus/issues/1009
Third Party Advisory
http://www.kb.cert.org/vuls/id/403768
Third Party Advisory
http://www.securityfocus.com/bid/100516
Third Party Advisory
https://github.com/pbatard/rufus/commit/c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb
Third Party Advisory
https://github.com/pbatard/rufus/issues/1009
22
/ 100
low-risk
Severity
17/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal