Vulnerability Description
UsbCharger.dll in the Energizer DUO USB battery charger software contains a backdoor that is implemented through the Arucer.dll file in the %WINDIR%\system32 directory, which allows remote attackers to download arbitrary programs onto a Windows PC, and execute these programs, via a request to TCP port 7777.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Energizer | Duo Usb | All versions |
Related Weaknesses (CWE)
References
- http://www.kb.cert.org/vuls/id/154421US Government Resource
- http://www.marketwatch.com/story/energizer-announces-duo-charger-and-usb-charger
- http://www.securityfocus.com/bid/38571Exploit
- http://www.symantec.com/connect/blogs/trojan-found-usb-battery-charger-softwareExploit
- http://www.kb.cert.org/vuls/id/154421US Government Resource
- http://www.marketwatch.com/story/energizer-announces-duo-charger-and-usb-charger
- http://www.securityfocus.com/bid/38571Exploit
- http://www.symantec.com/connect/blogs/trojan-found-usb-battery-charger-softwareExploit
FAQ
What is CVE-2010-0103?
CVE-2010-0103 is a vulnerability with a CVSS score of 9.3 (HIGH). UsbCharger.dll in the Energizer DUO USB battery charger software contains a backdoor that is implemented through the Arucer.dll file in the %WINDIR%\system32 directory, which allows remote attackers t...
How severe is CVE-2010-0103?
CVE-2010-0103 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-0103?
Check the references section above for vendor advisories and patch information. Affected products include: Energizer Duo Usb.