CVE-2017-2149
Published Apr 28, 2017
Last updated 5 years ago
Overview
- Description
- Untrusted search path vulnerability in installers of the software for SDHC/SDXC Memory Card with embedded NFC functionality Software Update Tool V1.00.03 and earlier, SDHC Memory Card with embedded wireless LAN functionality FlashAir Configuration Software V3.0.2 and earlier, SDHC Memory Card with embedded wireless LAN functionality FlashAir Software Update tool (SD-WE series<W-03>) V3.00.01, SDHC Memory Card with embedded wireless LAN functionality FlashAir Software Update tool (SD-WD/WC series<W-02>) V2.00.03 and earlier, SDHC Memory Card with embedded wireless LAN functionality FlashAir Software Update tool (SD-WB/WL series) V1.00.04 and earlier, SDHC Memory Card with embedded TransferJet functionality Configuration Software V1.02 and earlier, SDHC Memory Card with embedded TransferJet functionality Software Update tool V1.00.06 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
- Source
- vultures@jpcert.or.jp
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-426
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:toshiba:flashair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBA7647D-DB43-4DD7-89B4-02CD310B8F5B", "versionEndIncluding": "1.00.03" }, { "criteria": "cpe:2.3:a:toshiba:flashair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3E68A5E-C899-484D-87EA-F52414B66968", "versionEndIncluding": "1.00.04" }, { "criteria": "cpe:2.3:a:toshiba:flashair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8288D17C-1CE9-4B38-81C4-9C702E5800D9", "versionEndIncluding": "1.00.06" }, { "criteria": "cpe:2.3:a:toshiba:flashair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0CE8592-61C3-4F18-9398-3F9C2F5531A4", "versionEndIncluding": "1.02" }, { "criteria": "cpe:2.3:a:toshiba:flashair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7DB5458-E52B-497D-8B09-040FCDB13B78", "versionEndIncluding": "2.00.03" }, { "criteria": "cpe:2.3:a:toshiba:flashair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48762E2F-044E-43C6-8221-FBFBA9C8E7E4", "versionEndIncluding": "3.00.01" }, { "criteria": "cpe:2.3:a:toshiba:flashair:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C182FF61-0D00-4AE6-94CD-38BBB47050D5", "versionEndIncluding": "3.0.2" } ], "operator": "OR" } ] } ]