PatchSiren cyber security CVE debrief
CVE-2017-5166 Binom3 CVE debrief
CVE-2017-5166 is a critical information exposure vulnerability in BINOM3 Universal Multifunctional Electric Power Quality Meter firmware. The publicly available record says exposed information can be used to gain privileged access to the device. NVD rates the issue CVSS 3.0 9.8 and maps it to CWE-200.
- Vendor
- Binom3
- Product
- CVE-2017-5166
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
OT/ICS asset owners, site operators, network administrators, and security teams responsible for BINOM3 electric power quality meters or any industrial device deployed on reachable network segments.
Technical summary
The NVD record identifies the vulnerable component as BINOM3 Universal Multifunctional Electric Power Quality Meter firmware and classifies the weakness as CWE-200 (information exposure). The CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network-reachable exploitation with no privileges or user interaction required and severe potential impact. The record also references an ICS-CERT advisory and a SecurityFocus BID entry.
Defensive priority
Critical. Treat as urgent if the device or its management interface is reachable from any network beyond a tightly controlled OT segment.
Recommended defensive actions
- Inventory BINOM3 meter deployments and verify which devices run the affected firmware.
- Restrict network access to the meter and its management interfaces to required OT hosts only.
- Remove any unnecessary remote exposure, including direct Internet access and broad VLAN reachability.
- Review the referenced ICS-CERT advisory and vendor guidance for any remediation or mitigation steps.
- Monitor for unauthorized configuration access, privilege changes, and unexpected device behavior.
- If isolation is feasible, place affected devices on a segmented network with strict allow-listing and logging.
Evidence notes
This debrief is based on the supplied NVD record and its cited references. The record states an information exposure flaw, identifies BINOM3 firmware as vulnerable, assigns CWE-200, and gives CVSS 3.0 9.8. The supplied corpus does not provide affected firmware versions or a vendor patch status.
Official resources
-
CVE-2017-5166 CVE record
CVE.org
-
CVE-2017-5166 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, US Government Resource
Publicly disclosed in the CVE record on 2017-02-13 and later modified in NVD on 2026-05-13. No KEV listing is present in the supplied data.