// For flags

CVE-2017-2784

 

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.

Existe una vulnerabilidad explotable libre de un apuntador de pila en el código de análisis de certificado x509 de ARM mbed TLS en versiones anteriores a 1.3.19, 2.x en versiones anteriores a 2.1.7 y 2.4.x en versiones anteriores a 2.4.2. Un certificado x509 especialmente manipulado, cuando se analiza por la biblioteca TLS mbed, puede provocar un inválido libre de un puntero de pila que conduce a una posible ejecución de código remoto. Para aprovechar esta vulnerabilidad, un atacante puede actuar como un cliente o un servidor en una red para entregar certificados maliciosos x509 a aplicaciones vulnerables.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-01 CVE Reserved
  • 2017-04-20 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-09-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-295: Improper Certificate Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
<= 1.3.18
Search vendor "Arm" for product "Mbed Tls" and version " <= 1.3.18"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.0.0
Search vendor "Arm" for product "Mbed Tls" and version "2.0.0"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.1.0
Search vendor "Arm" for product "Mbed Tls" and version "2.1.0"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.1.1
Search vendor "Arm" for product "Mbed Tls" and version "2.1.1"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.1.2
Search vendor "Arm" for product "Mbed Tls" and version "2.1.2"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.1.3
Search vendor "Arm" for product "Mbed Tls" and version "2.1.3"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.1.4
Search vendor "Arm" for product "Mbed Tls" and version "2.1.4"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.1.5
Search vendor "Arm" for product "Mbed Tls" and version "2.1.5"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.1.6
Search vendor "Arm" for product "Mbed Tls" and version "2.1.6"
-
Affected
Arm
Search vendor "Arm"
Mbed Tls
Search vendor "Arm" for product "Mbed Tls"
2.4.0
Search vendor "Arm" for product "Mbed Tls" and version "2.4.0"
-
Affected