// For flags

CVE-2017-17704

iStar Ultra / IP-ACM Boards Fixed AES Key

Severity Score

7.4
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A door-unlocking issue was discovered on Software House iStar Ultra devices through 6.5.2.20569 when used in conjunction with the IP-ACM Ethernet Door Module. The communications between the IP-ACM and the iStar Ultra is encrypted using a fixed AES key and IV. Each message is encrypted in CBC mode and restarts with the fixed IV, leading to replay attacks of entire messages. There is no authentication of messages beyond the use of the fixed AES key, so message forgery is also possible.

Se ha descubierto un problema de desbloqueo de puertas en dispositivos Software House iStar Ultra hasta la versión 6.5.2.20569 cuando se usan en conjunto con IP-ACM Ethernet Door Module. Las comunicaciones entre el IP-ACM y el iStar Ultra se cifran empleando una clave AES fija e IV. Cada mensaje se cifra en modo CBC y reinicia con el IV fijo, lo que conduce a ataques de reproducción de mensajes completos. No hay autenticación de mensajes más allá del uso de la clave AES fija, por lo que también es posible falsificar mensajes.

Vulnerabilities were identified in the iStar Ultra and IP-ACM boards offered by Software House. The communications between the IP-ACM and the iStar Ultra is encrypted using a fixed AES key and IV. Each message is encrypted in CBC mode and restarts with the fixed IV, leading to replay attacks of entire messages. There is no authentication of messages beyond the use of the fixed AES key, so message forgery is also possible.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-12-15 CVE Reserved
  • 2017-12-20 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-330: Use of Insufficiently Random Values
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Swhouse
Search vendor "Swhouse"
Istar Ultra Firmware
Search vendor "Swhouse" for product "Istar Ultra Firmware"
<= 6.5.2.20569
Search vendor "Swhouse" for product "Istar Ultra Firmware" and version " <= 6.5.2.20569"
-
Affected
in Swhouse
Search vendor "Swhouse"
Istar Ultra
Search vendor "Swhouse" for product "Istar Ultra"
--
Safe