Vulnerability Description
The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Brightsign | 4K242 Firmware | <= 6.2.63 |
| Brightsign | 4K242 | - |
Related Weaknesses (CWE)
References
- http://www.information-paradox.net/2017/12/brightsign-multiple-vulnerablities-cvIssue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/43364/ExploitIssue TrackingThird Party Advisory
- http://www.information-paradox.net/2017/12/brightsign-multiple-vulnerablities-cvIssue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/43364/ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2017-17739?
CVE-2017-17739 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.
How severe is CVE-2017-17739?
CVE-2017-17739 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-17739?
Check the references section above for vendor advisories and patch information. Affected products include: Brightsign 4K242 Firmware, Brightsign 4K242.