CVE-2017-17704
iStar Ultra / IP-ACM Boards Fixed AES Key
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A door-unlocking issue was discovered on Software House iStar Ultra devices through 6.5.2.20569 when used in conjunction with the IP-ACM Ethernet Door Module. The communications between the IP-ACM and the iStar Ultra is encrypted using a fixed AES key and IV. Each message is encrypted in CBC mode and restarts with the fixed IV, leading to replay attacks of entire messages. There is no authentication of messages beyond the use of the fixed AES key, so message forgery is also possible.
Se ha descubierto un problema de desbloqueo de puertas en dispositivos Software House iStar Ultra hasta la versión 6.5.2.20569 cuando se usan en conjunto con IP-ACM Ethernet Door Module. Las comunicaciones entre el IP-ACM y el iStar Ultra se cifran empleando una clave AES fija e IV. Cada mensaje se cifra en modo CBC y reinicia con el IV fijo, lo que conduce a ataques de reproducción de mensajes completos. No hay autenticación de mensajes más allá del uso de la clave AES fija, por lo que también es posible falsificar mensajes.
Vulnerabilities were identified in the iStar Ultra and IP-ACM boards offered by Software House. The communications between the IP-ACM and the iStar Ultra is encrypted using a fixed AES key and IV. Each message is encrypted in CBC mode and restarts with the fixed IV, leading to replay attacks of entire messages. There is no authentication of messages beyond the use of the fixed AES key, so message forgery is also possible.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-12-15 CVE Reserved
- 2017-12-20 CVE Published
- 2024-08-05 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-330: Use of Insufficiently Random Values
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://systemoverlord.com/2017/12/18/cve-2017-17704-broken-cryptography-in-istar-ultra-ip-acm-by-software-house.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Swhouse Search vendor "Swhouse" | Istar Ultra Firmware Search vendor "Swhouse" for product "Istar Ultra Firmware" | <= 6.5.2.20569 Search vendor "Swhouse" for product "Istar Ultra Firmware" and version " <= 6.5.2.20569" | - |
Affected
| in | Swhouse Search vendor "Swhouse" | Istar Ultra Search vendor "Swhouse" for product "Istar Ultra" | - | - |
Safe
|