CVE-2017-5135
high-risk
Published 2017-04-27
Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability.
Do I need to act?
!
22.4% chance of exploitation in next 30 days
EPSS score — higher than 78% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Dpc3928Sl Firmware
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/98092
Technical Description
https://stringbleed.github.io/
Press/Media Coverage
https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication...
Third Party Advisory
http://www.securityfocus.com/bid/98092
Technical Description
https://stringbleed.github.io/
Press/Media Coverage
https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication...
50
/ 100
high-risk
Severity
31/34 · Critical
Exploitability
14/34 · Moderate
Exposure
5/34 · Minimal