Vulnerabilities > CVE-2017-2865 - Unspecified vulnerability in Meetcircle Circle With Disney Firmware 2.0.1
Attack vector
ADJACENT_NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH high complexity
meetcircle
Summary
An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Hardware | 1 |
Seebug
bulletinFamily | exploit |
description | ### Summary An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability. ### Tested Versions Circle with Disney ### Product URLs https://meetcircle.com/ ### CVSSv3 Score 9.6 - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H ### CWE CWE-300: Channel Accessible by Non-Endpoint ('Man-in-the-Middle') ### Details Circle with Disney is a network device used to monitor and restrict internet use of children on a given network. When connected to a given network and configured, it immediately begins ARP poisoning all other devices on the network, such that it can validate and restrict all traffic as is seen fit by the parent/administrator of the device. Periodically, the device will query outbound towards the meetcircle.co domain, checking to see if there is a firmware update available. Upon detection of a new version, the server will grab the newest firmwareupdater.sh script and run it. Unfortunately, both the version detection and the firmwareupdater.sh script are acquired via a 'wget' over regular HTTP, such that it is possible to intercept and upload an arbitrary script to the device to be run as root. ARP poisoning is one of the easiest vectors to execute this attack with. ### Timeline * 2017-07-13 - Vendor Disclosure * 2017-10-31 - Public Release ### CREDIT Discovered by Lilith Wyatt <(^_^)>, Cory Duplantis, Yves Younan, Marcin 'Icewall' Noga, Claudio Bozzato, Aleksandar Nikolic, and Richard Johnson of Cisco Talos. |
id | SSV:96818 |
last seen | 2017-11-19 |
modified | 2017-11-08 |
published | 2017-11-08 |
reporter | Root |
title | Circle with Disney Firmware Update Command Injection Vulnerability(CVE-2017-2865) |
Talos
id | TALOS-2017-0371 |
last seen | 2019-05-29 |
published | 2017-10-31 |
reporter | Talos Intelligence |
source | http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0371 |
title | Circle with Disney Firmware Update Command Injection Vulnerability |