Circle with Disney ¼Ò³¤ÖÎÀíÓëÍøÂç¹ýÂ˲úÆ·¶à¸öÇå¾²Îó²î
2017-11-01
×ÛÊö
ÍâµØÊ±¼ä2017Äê10ÔÂ31ÈÕ£¬TalosÐû²¼ÁËһϵÁйØÓÚCircle with Disney²úÆ·µÄÎó²îͨ¸æ£¬º¸Ç°üÀ¨Ô¶³Ì´úÂëÖ´ÐУ¬ÏÂÁî×¢È룬¾Ü¾ø·þÎñµÈÔÚÄÚµÄ22¸ö²î±ðµÄÎó²îÇÒ²¿·ÖÎó²îCVSS 3.0ÆÀ·ÖµÖ´ï¸ßΣµÄ9.9ÒÔ¼°10·Ö¡£Ê¹ÓøòúÆ·µÄÓû§Ó¦ÊµÊ±Éý¼¶À´·À»¤¡£
Ïà¹ØÁ´½Ó£º
https://www.talosintelligence.com/vulnerability_reports#disclosed
¹ØÓÚCircle with Disney
Circle with DisneyÊÇÒ»¿î¼Ò³¤ÖÎÀíÓëÍøÂç¹ýÂ˵IJúÆ·¡£Circle»áÎÞÏßÅþÁ¬ÄúµÄ¼ÒÍ¥Wi-Fi£¬²¢ÔÊÐíÄúÖÎÀíÍøÂçÉϵÄÿ¸ö×°±¸¡£ ʹÓÃCircleÓ¦ÓóÌÐò£¬¼ÒÍ¥¿ÉÒÔΪÿ¸ö¼ÒÍ¥³ÉÔ±½¨ÉèÒ»¸öÉèÖÃÎļþ£¬°üÀ¨Ê±¼äÏÞÖÆ£¬ÄÚÈݹýÂË£¬Ê¹ÓÃͳ¼ÆµÈ¹¦Ð§¡£ ´ÓÕâÀï×îÏÈ£¬º¢×ÓÃǽ«ÓµÓÐÒ»¸öΪËûÃÇÉè¼ÆµÄÅþÁ¬ÌåÑé¡£
ÊÜÓ°ÏìµÄ°æ±¾
l Circle with Disney 2.0.1
Îó²îÐÅÏ¢
|
Îó²î |
CVE |
CVSS 3.0ÆÀ·Ö |
|
Firmware Update Signature Check Bypass Vulnerability |
CVE-2017-2898 |
9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
Apid Photo Upload Denial of Service Vulnerability |
CVE-2017-2884 |
7.5 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
Apid Server Fork Denial of Service Vulnerability |
CVE-2017-2889 |
7.5 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
Apid Strstr Authentication Bypass Vulnerability |
CVE-2017-2914 |
9.0 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
Apid Use-Between-Reallocs Information Disclosure Vulnerability |
CVE-2017-12083 |
5.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N |
|
Backup API Command Injection Vulnerability |
CVE-2017-2866 |
9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
Configuration Restore Photos File Overwrite Vulnerability |
CVE-2017-2916 |
9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
Database Updater Code Execution Vulnerability |
CVE-2017-2883 |
9.0 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
Firmware Update Command Injection Vulnerability |
CVE-2017-2865 |
9.6 - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
Goclient SSL TLD MITM Vulnerability |
CVE-2017-2912 |
7.4 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
Rclient SSH Persistent Remote Access Vulnerability |
CVE-2017-12084 |
8.0 - CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
|
Startup WiFi Channel Parsing Command Injection Vulnerability |
CVE-2017-12094 |
7.4 - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
|
Rclient SSL TLD MITM Vulnerability |
CVE-2017-2911 |
9.0 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
libbluecoat.so SSL TLD MITM Vulnerability |
CVE-2017-2913 |
8.1 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
configure.xml Notifications Command Injection Vulnerability |
CVE-2017-2917 |
9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
check_torlist.sh Update Code Execution Vulnerability |
CVE-2017-2881 |
9.6 - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
check_circleservers Code Execution Vulnerability |
CVE-2017-2882 |
9.0 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
WiFi Security Downgrade Vulnerability |
CVE-2017-12096 |
6.5 - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
WiFi Restart SSID Parsing Command Injection Vulnerability |
CVE-2017-2915 |
9.0 - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
Weak Authentication Vulnerability |
CVE-2017-2864 |
9.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
Token Routing Vulnerability |
CVE-2017-12085 |
9.0 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
Restore API Command Injection Vulnerability |
CVE-2017-2890 |
9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
½â¾ö¼Æ»®
Circle¹Ù·½ÒѾÐû²¼Ð°汾ÐÞ¸´ÁËÎó²î£¬ÇëÓû§¾¡¿ìÉý¼¶¹Ì¼þÀ´¾ÙÐзÀ»¤¡£
²Î¿¼Á´½Ó£º
https://support.meetcircle.com/13577-general-help/whats-the-latest-app-and-firmware-version-of-circle?from_search=19392044

¾ÅÓÎÀϸçÔÆ





