CVE-2017-20233
Firewall Filtering Bypass in Hirschmann HiLCOS via Multicast Traffic
Publication date: 2026-04-03
Last updated on: 2026-04-03
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hirschmann | hilcos_openbat | * |
| hirschmann | hilcos_bat450 | * |
| hirschmann | hilcos_wlc | * |
| hirschmann | hilcos_bat867 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Hirschmann HiLCOS products OpenBAT, BAT450, WLC, and BAT867. It is a firewall filtering issue where the firewall fails to correctly filter IPv4 multicast and broadcast traffic when management IP address filtering is disabled. As a result, configured filter rules can be bypassed, allowing attackers with network access to inject or observe multicast and broadcast packets that should have been blocked by the firewall.
How can this vulnerability impact me? :
The impact of this vulnerability is that attackers with network access can bypass firewall rules to inject or observe multicast and broadcast traffic that should have been blocked. This can lead to unauthorized network traffic being sent or received, potentially exposing sensitive information or allowing malicious traffic to propagate within the network.