Vulnerability Description
The Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attacker is able to run shell commands and receive valid output from the device.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Orpak | Siteomat | < 6.4.414.122 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/108167Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01Third Party AdvisoryUS Government Resource
- https://www.orpak.comVendor Advisory
- http://www.securityfocus.com/bid/108167Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-19-122-01Third Party AdvisoryUS Government Resource
- https://www.orpak.comVendor Advisory
FAQ
What is CVE-2017-14853?
CVE-2017-14853 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Orpak SiteOmat OrCU component is vulnerable to code injection, for all versions prior to 2017-09-25, due to a search query that uses a direct shell command. By tampering with the request, an attac...
How severe is CVE-2017-14853?
CVE-2017-14853 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14853?
Check the references section above for vendor advisories and patch information. Affected products include: Orpak Siteomat.