CVE-2010-0103
Published Mar 10, 2010
Last updated 15 years ago
Overview
- Description
- UsbCharger.dll in the Energizer DUO USB battery charger software contains a backdoor that is implemented through the Arucer.dll file in the %WINDIR%\system32 directory, which allows remote attackers to download arbitrary programs onto a Windows PC, and execute these programs, via a request to TCP port 7777.
- Source
- cret@cert.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Evaluator
- Comment
- Per: http://www.energizer.com/usbcharger/download/March_8_2010_USB_Release__3_.pdf "Energizer has discontinued sale of this product and has removed the site to download the software. In addition, the company is directing consumers that downloaded the Windows version of the software to uninstall or otherwise remove the software from your computer."
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:energizer:duo_usb:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBC9F191-80B0-4895-AB4E-C060F0D0F3F4" } ], "operator": "OR" } ] } ]