Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-17023

EPSS 0.07% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-17023

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Sophos UTM VPN endpoint interacts with client software provided by NPC Engineering (www.ncp-e.com). The affected client software, "Sophos IPSec Client" 11.04 is a rebranded version of NCP "Secure Entry Client" 10.11 r32792. A vulnerability in the software update feature of the VPN client allows a man-in-the-middle (MITM) or man-on-the-side (MOTS) attacker to execute arbitrary, malicious software on a target user's computer. This is related to SIC_V11.04-64.exe (Sophos), NCP_EntryCl_Windows_x86_1004_31799.exe (NCP), and ncpmon.exe (both Sophos and NCP). The vulnerability exists because: (1) the VPN client requests update metadata over an insecure HTTP connection; and (2) the client software does not check if the software update is signed before running it.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Sophos IPSec Client 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Sophos IPSec Client是一款VPN客户端应用程序。 Sophos IPSec Client 11.04版本(NCPSecure Entry Client 10.11 r32792版本)中存在数据伪造问题漏洞。该漏洞源于网络系统或产品未充分验证数据的来源或真实性。攻击者可利用伪造的数据进行攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-17023

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-17023

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-04-09 · 31 CVEs total

CVE-2019-11028GAT-Ship Web Module 代码问题漏洞
CVE-2019-11065Gradle 安全特征问题漏洞
CVE-2019-5513VMware Horizon 信息泄露漏洞
CVE-2019-5512VMware Workstation 权限许可和访问控制问题漏洞
CVE-2019-5511VMware Workstation 权限许可和访问控制问题漏洞
CVE-2019-1567Palo Alto Networks Expedition Migration Tool 跨站脚本漏洞
CVE-2018-18365Symantec Norton Password Manager 输入验证错误漏洞
CVE-2018-7117HPE Integrated Lights-Out 5 跨站脚本漏洞
CVE-2018-7118HPE Service Pack for ProLiant 访问控制错误漏洞
CVE-2019-7174Roxy Fileman 输入验证错误漏洞
CVE-2019-6117WordPress wpape APE GALLERY插件跨站脚本漏洞
CVE-2018-19586Silverpeas 路径遍历漏洞
CVE-2018-14894CyberArk Software Endpoint Privilege Manager 权限许可和访问控制问题漏洞
CVE-2018-20698Elasticsearch Kibana floragunn Search Guard插件输入验证错误漏洞
CVE-2018-19589marked 访问控制错误漏洞
CVE-2019-10894Wireshark 资源管理错误漏洞
CVE-2019-10634ZyXEL NAS 326 跨站脚本漏洞
CVE-2019-10633ZyXEL NAS 326 代码注入漏洞
CVE-2019-10632ZyXEL NAS 326 路径遍历漏洞
CVE-2019-10631ZyXEL NAS 326 命令操作系统命令注入漏洞

Showing top 20 of 31 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-17023

No comments yet


Leave a comment