Vulnerability Description
Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mersive | Solstice Firmware | < 2.8.4 |
| Mersive | Solstice | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-EExploitThird Party AdvisoryVDB Entry
- https://documentation.mersive.com/content/pages/release-notes.htmRelease NotesVendor Advisory
- https://github.com/aress31/cve-2017-12945ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/47722ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-EExploitThird Party AdvisoryVDB Entry
- https://documentation.mersive.com/content/pages/release-notes.htmRelease NotesVendor Advisory
- https://github.com/aress31/cve-2017-12945ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/47722ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-12945?
CVE-2017-12945 is a vulnerability with a CVSS score of 8.8 (HIGH). Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
How severe is CVE-2017-12945?
CVE-2017-12945 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-12945?
Check the references section above for vendor advisories and patch information. Affected products include: Mersive Solstice Firmware, Mersive Solstice.