First published: Wed Dec 20 2017(Updated: )
Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the authentication applies to the IP address of the NAT gateway, and any user behind that NAT gateway is also treated as authenticated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-SG108E Firmware | =1.0.0 | |
TP-Link TL-SG108E Firmware | =1.0 | |
TP-Link TL-SG108E Firmware | =2.0 | |
TP-Link TL-SG108E Firmware | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17746 is considered a medium severity vulnerability due to weak access control that allows unauthorized access by users on a NAT network.
To fix CVE-2017-17746, update the TP-Link TL-SG108E firmware to a version that addresses this vulnerability.
Users of the TP-Link TL-SG108E running firmware version 1.0.0 are affected by CVE-2017-17746.
CVE-2017-17746 is classified as an access control vulnerability.
Yes, CVE-2017-17746 can be exploited remotely by an authenticated user on a NAT network.