CVE-2017-10934
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
All versions prior to V5.09.02.02T4 of the ZTE ZXIPTV-EPG product use the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host.
Todas las versiones anteriores a la V5.09.02.02T4 del producto ZTE ZXIPTV-EPG emplean el servicio Java RMI por el que los servidores emplean la biblioteca Apache Commons Collections (ACC), lo que podría resultar en vulnerabilidades de deserialización Java. Un atacante remoto no autenticado puede explotar estas vulnerabilidades mediante el envío de una petición RMI para ejecutar código arbitrario en el host objetivo.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-05 CVE Reserved
- 2018-07-25 CVE Published
- 2024-09-17 CVE Updated
- 2024-10-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008682 | 2018-10-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zte Search vendor "Zte" | Zxiptv-epg Firmware Search vendor "Zte" for product "Zxiptv-epg Firmware" | < 5.09.02.02t4 Search vendor "Zte" for product "Zxiptv-epg Firmware" and version " < 5.09.02.02t4" | - |
Affected
| in | Zte Search vendor "Zte" | Zxiptv-epg Search vendor "Zte" for product "Zxiptv-epg" | - | - |
Safe
|