Learn about CVE-2017-17704 affecting Software House iStar Ultra devices. Discover the impact, affected systems, exploitation details, and mitigation steps.
Software House iStar Ultra devices up to version 6.5.2.20569, when used with the IP-ACM Ethernet Door Module, are vulnerable to replay attacks due to a flaw in the encryption mechanism.
Understanding CVE-2017-17704
Software House iStar Ultra devices are affected by a cryptographic vulnerability that allows unauthorized access to doors.
What is CVE-2017-17704?
The issue lies in the communication between the IP-ACM and iStar Ultra devices, where messages are encrypted in CBC mode with a fixed IV, making them susceptible to replay attacks and message forgery.
The Impact of CVE-2017-17704
This vulnerability could lead to unauthorized individuals gaining access to secure areas by exploiting the flawed encryption process.
Technical Details of CVE-2017-17704
Software House iStar Ultra devices are affected by a cryptographic weakness that compromises the security of door access control systems.
Vulnerability Description
The flaw allows attackers to replay entire messages and forge new ones due to the predictable IV and lack of message authentication beyond the fixed AES key.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Steps to address and prevent the exploitation of CVE-2017-17704
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates