10
CVE-2017-3222
- EPSS 6.12%
- Veröffentlicht 22.07.2017 20:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cret@cert.org
- CVE-Watchlists
- Unerledigt
Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Inmarsat ≫ Amosconnect Version8.0
Inmarsat ≫ Amosconnect Version8.0.1
Inmarsat ≫ Amosconnect Version8.0.2
Inmarsat ≫ Amosconnect Version8.2.0
Inmarsat ≫ Amosconnect Version8.2.1
Inmarsat ≫ Amosconnect Version8.2.2
Inmarsat ≫ Amosconnect Version8.3.0
Inmarsat ≫ Amosconnect Version8.3.1
Inmarsat ≫ Amosconnect Version8.4.0
Inmarsat ≫ Amosconnect Version8.4.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 6.12% | 0.898 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.