{"containers":{"cna":{"affected":[{"product":"Smart Visu Server","vendor":"JUNG","versions":[{"status":"affected","version":"1.0.804"},{"status":"affected","version":"1.0.830"},{"status":"affected","version":"1.0.832"}]}],"credits":[{"lang":"en","value":"T. Weber"}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832 and classified as critical. Affected by this vulnerability is an unknown functionality of the component KNX Group Address. The manipulation leads to backdoor. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-912","description":"CWE-912 Backdoor","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-22T06:10:17.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Feb/18"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.96817"}],"title":"JUNG Smart Visu Server KNX Group Address backdoor","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20084","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"JUNG Smart Visu Server KNX Group Address backdoor"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Smart Visu Server","version":{"version_data":[{"version_value":"1.0.804"},{"version_value":"1.0.830"},{"version_value":"1.0.832"}]}}]},"vendor_name":"JUNG"}]}},"credit":"T. Weber","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832 and classified as critical. Affected by this vulnerability is an unknown functionality of the component KNX Group Address. The manipulation leads to backdoor. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"5.3","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-912 Backdoor"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Feb/18","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Feb/18"},{"name":"https://vuldb.com/?id.96817","refsource":"MISC","url":"https://vuldb.com/?id.96817"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.474Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Feb/18"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.96817"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:08:58.502445Z","id":"CVE-2017-20084","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:15:30.202Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20084","datePublished":"2022-06-22T06:10:18.000Z","dateReserved":"2022-06-19T00:00:00.000Z","dateUpdated":"2025-04-15T14:15:30.202Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}