First published: Tue Nov 07 2017(Updated: )
An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the rclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Meetcircle Circle With Disney Firmware | =2.0.1 | |
Meetcircle Circle With Disney |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2911 has been classified as a high-severity vulnerability due to its potential for exploitation through SSL certificate manipulation.
To fix CVE-2017-2911, update the Circle with Disney device firmware to the latest version that addresses this vulnerability.
CVE-2017-2911 specifically affects Circle with Disney devices running firmware version 2.0.1.
An attacker could exploit CVE-2017-2911 by hosting a malicious HTTPS server that the vulnerable device may incorrectly trust.
The threat posed by CVE-2017-2911 largely depends on whether affected devices are still running the vulnerable firmware version.