Miggo Logo

CVE-2016-10601: Downloads Resources over HTTP in webdrvr

9.3

CVSS Score

Basic Information

EPSS Score
0.66847%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Package NameEcosystemVulnerable VersionsFirst Patched Version
webdrvrnpm<= 2.43.0-1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly stems from insecure HTTP downloads of executables. While exact function names/paths aren't provided in advisories, Node.js packages implementing driver downloads would logically contain a download() function using http.get() or similar methods. The confidence is high because: 1) The vulnerability type (CWE-311) directly maps to unencrypted transfers 2) The attack vector requires HTTP resource fetching 3) NPM ecosystem patterns suggest a dedicated download() function would exist for driver management.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `w***rvr` ins**ur*ly *ownlo** *n *x**ut**l* ov*r *n un*n*rypt** *TTP *onn**tion. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, it is possi*l* to int*r**pt t** r*spons* *n* r*pl*** t** *x**ut**l* wit* * m*li*

Reasoning

T** vuln*r**ility *xpli*itly st*ms *rom ins**ur* *TTP *ownlo**s o* *x**ut**l*s. W*il* *x**t *un*tion n*m*s/p*t*s *r*n't provi*** in **visori*s, `No**.js` p**k***s impl*m*ntin* *riv*r *ownlo**s woul* lo*i**lly *ont*in * `*ownlo**()` *un*tion usin* `*t