Vulnerability Description
An issue was discovered in Valve Steam Link build 643. When the SSH daemon is enabled for local development, the device is publicly available via IPv6 TCP port 22 over the internet (with stateless address autoconfiguration) by default, which makes it easier for remote attackers to obtain access by guessing 24 bits of the MAC address and attempting a root login. This can be exploited in conjunction with CVE-2017-17878.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Valvesoftware | Steam Link Firmware | < 644 |
| Valvesoftware | Steam Link | - |
References
- https://blogger.davidmanouchehri.com/2017/12/steam-link-security-remotely-insecuIssue TrackingThird Party Advisory
- https://github.com/ValveSoftware/steamlink-sdk#ssh-accessIssue TrackingThird Party Advisory
- https://github.com/ValveSoftware/steamlink-sdk/issues/119Issue TrackingThird Party Advisory
- https://blogger.davidmanouchehri.com/2017/12/steam-link-security-remotely-insecuIssue TrackingThird Party Advisory
- https://github.com/ValveSoftware/steamlink-sdk#ssh-accessIssue TrackingThird Party Advisory
- https://github.com/ValveSoftware/steamlink-sdk/issues/119Issue TrackingThird Party Advisory
FAQ
What is CVE-2017-17877?
CVE-2017-17877 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in Valve Steam Link build 643. When the SSH daemon is enabled for local development, the device is publicly available via IPv6 TCP port 22 over the internet (with stateless add...
How severe is CVE-2017-17877?
CVE-2017-17877 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-17877?
Check the references section above for vendor advisories and patch information. Affected products include: Valvesoftware Steam Link Firmware, Valvesoftware Steam Link.