Vulnerability Description
An Improper Access Control issue was discovered in Schweitzer Engineering Laboratories (SEL) SEL-3620 and SEL-3622 Security Gateway Versions R202 and, R203, R203-V1, R203-V2 and, R204, R204-V1. The device does not properly enforce access control while configured for NAT port forwarding, which may allow for unauthorized communications to downstream devices.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Selinc | Sel-3620 Firmware | r202 |
| Selinc | Sel-3620 | - |
| Selinc | Sel-3622 Firmware | r202 |
| Selinc | Sel-3622 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99536Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-192-06MitigationThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/99536Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-17-192-06MitigationThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-7928?
CVE-2017-7928 is a vulnerability with a CVSS score of 10.0 (CRITICAL). An Improper Access Control issue was discovered in Schweitzer Engineering Laboratories (SEL) SEL-3620 and SEL-3622 Security Gateway Versions R202 and, R203, R203-V1, R203-V2 and, R204, R204-V1. The de...
How severe is CVE-2017-7928?
CVE-2017-7928 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7928?
Check the references section above for vendor advisories and patch information. Affected products include: Selinc Sel-3620 Firmware, Selinc Sel-3620, Selinc Sel-3622 Firmware, Selinc Sel-3622.