PatchSiren cyber security CVE debrief
CVE-2017-5169 Hanwha Security CVE debrief
CVE-2017-5169 affects Hanwha Techwin Smart Security Manager versions 1.5 and earlier. The issue is described as multiple cross-site request forgery flaws in the bundled Redis and Apache Felix Gogo servers. According to the CVE record, specific HTTP POST requests can be used to gain system-level access to a remote shell session, creating remote code execution risk. NVD lists the issue as CVSS 3.1 7.5 High with network attack vector, user interaction required, and high confidentiality/integrity/availability impact.
- Vendor
- Hanwha Security
- Product
- CVE-2017-5169
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Organizations running Smart Security Manager 1.5 or earlier should treat this as a high-priority issue, especially if the management interface is reachable by users who could be induced to submit requests or if the product is exposed in an operational network.
Technical summary
The vulnerability is a CSRF weakness (CWE-352) in Smart Security Manager deployments that include Redis and Apache Felix Gogo servers. NVD’s vector indicates network exploitation with required user interaction and no privileges, while the CVE description says crafted HTTP POST requests can trigger a remote shell session with system-level access. The affected CPE range in NVD ends at version 1.5 inclusive.
Defensive priority
High. The combination of remote network reachability, user interaction, and potential system-level shell access makes this a significant exposure for any affected deployment.
Recommended defensive actions
- Confirm whether Smart Security Manager is version 1.5 or earlier and prioritize upgrade or removal of the affected instance.
- Follow the vendor and US-CERT guidance referenced in ICSA-17-040-01 for available remediation or mitigation steps.
- Restrict access to the product’s management interfaces to trusted administrative networks only.
- Review whether CSRF protections and session-handling controls are properly enforced on the exposed administrative functions.
- Monitor for unexpected HTTP POST activity targeting the product’s administration and bundled service endpoints.
Evidence notes
Core facts are drawn from the CVE description, NVD record, and the US-CERT advisory reference. NVD lists CWE-352 and a CVSS 3.1 vector of AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. The CVE description states the issue affects Smart Security Manager 1.5 and prior and can lead to remote code execution through specific HTTP POST requests. No exploit code or unsupported remediation claims are included.
Official resources
-
CVE-2017-5169 CVE record
CVE.org
-
CVE-2017-5169 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Patch, Third Party Advisory, US Government Resource
CVE published 2017-02-13T21:59:03.067Z; NVD record modified 2026-05-13T00:24:29.033Z. Timing in this brief follows the CVE publication date from the supplied record.