All the vulnerabilites related to Microsoft - C# SDK
cve-2018-8119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104070 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:46:13.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119" }, { "name": "104070", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104070" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "C# SDK", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "Azure IoT" } ] }, { "product": "C SDK", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "Azure IoT" } ] }, { "product": "Java SDK", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "Azure IoT" } ] } ], "datePublic": "2018-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119" }, { "name": "104070", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104070" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2018-8119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "C# SDK", "version": { "version_data": [ { "version_value": "Azure IoT" } ] } }, { "product_name": "C SDK", "version": { "version_data": [ { "version_value": "Azure IoT" } ] } }, { "product_name": "Java SDK", "version": { "version_data": [ { "version_value": "Azure IoT" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119" }, { "name": "104070", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104070" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2018-8119", "datePublished": "2018-05-09T19:00:00", "dateReserved": "2018-03-14T00:00:00", "dateUpdated": "2024-08-05T06:46:13.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201810-1439
Vulnerability from variot
A remote code execution vulnerability exists in the way that Azure IoT Hub Device Client SDK using MQTT protocol accesses objects in memory, aka "Azure IoT Device Client SDK Memory Corruption Vulnerability." This affects Hub Device Client SDK, Azure IoT Edge. Microsoft C SDK for Azure IoT is a C language based software development kit for developing Azure IoT (Internet of Things Platform) applications. An attacker could use this vulnerability to execute arbitrary code in the context of the currently logged-on user. A failed attack will result in a denial of service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-1439", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "azure internet of things edge", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": null }, { "model": "csharp software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "hub device client sdk for azure iot", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "0" }, { "model": "azure iot edge", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems" }, { "model": "c# sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "csharp software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21220" }, { "db": "BID", "id": "105472" }, { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "NVD", "id": "CVE-2018-8531" }, { "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:azure_internet_of_things_edge:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:csharp_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-8531" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cristian Pop of Azure IoT.", "sources": [ { "db": "BID", "id": "105472" }, { "db": "CNNVD", "id": "CNNVD-201810-308" } ], "trust": 0.9 }, "cve": "CVE-2018-8531", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-8531", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2018-21220", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-8531", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-8531", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-21220", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201810-308", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21220" }, { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "NVD", "id": "CVE-2018-8531" }, { "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A remote code execution vulnerability exists in the way that Azure IoT Hub Device Client SDK using MQTT protocol accesses objects in memory, aka \"Azure IoT Device Client SDK Memory Corruption Vulnerability.\" This affects Hub Device Client SDK, Azure IoT Edge. Microsoft C SDK for Azure IoT is a C language based software development kit for developing Azure IoT (Internet of Things Platform) applications. An attacker could use this vulnerability to execute arbitrary code in the context of the currently logged-on user. A failed attack will result in a denial of service condition", "sources": [ { "db": "NVD", "id": "CVE-2018-8531" }, { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "CNVD", "id": "CNVD-2018-21220" }, { "db": "CNNVD", "id": "CNNVD-201810-308" }, { "db": "BID", "id": "105472" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-8531", "trust": 3.3 }, { "db": "BID", "id": "105472", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-013481", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-21220", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201810-308", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21220" }, { "db": "BID", "id": "105472" }, { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "NVD", "id": "CVE-2018-8531" }, { "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "id": "VAR-201810-1439", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-21220" } ], "trust": 1.35 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21220" } ] }, "last_update_date": "2023-12-18T12:28:38.045000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2018-8531 | Azure IoT Device Client SDK Memory Corruption Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8531" }, { "title": "CVE-2018-8531 | Azure IoT Device Client SDK \u306e\u30e1\u30e2\u30ea\u7834\u640d\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2018-8531" }, { "title": "Patch for Microsoft Azure IoT Device Client SDK Remote Memory Corruption Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/142739" }, { "title": "Microsoft Azure IoT Edge and Hub Device Client SDK for Azure IoT Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=85501" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21220" }, { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "NVD", "id": "CVE-2018-8531" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/105472" }, { "trust": 1.9, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8531" }, { "trust": 1.4, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8531" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20181010-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2018/at180041.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8531" }, { "trust": 0.3, "url": "http://www.microsoft.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21220" }, { "db": "BID", "id": "105472" }, { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "NVD", "id": "CVE-2018-8531" }, { "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-21220" }, { "db": "BID", "id": "105472" }, { "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "db": "NVD", "id": "CVE-2018-8531" }, { "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-21220" }, { "date": "2018-10-09T00:00:00", "db": "BID", "id": "105472" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "date": "2018-10-10T13:29:06.243000", "db": "NVD", "id": "CVE-2018-8531" }, { "date": "2018-10-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-21220" }, { "date": "2018-10-09T00:00:00", "db": "BID", "id": "105472" }, { "date": "2019-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013481" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2018-8531" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-308" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-308" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hub Device Client SDK and Azure IoT Edge Remote Code Execution Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013481" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-308" } ], "trust": 0.6 } }
var-201805-1058
Vulnerability from variot
A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka "Azure IoT SDK Spoofing Vulnerability." This affects C# SDK, C SDK, Java SDK. Microsoft C #, C, and Java SDK for Azure IoT are software development kits for Microsoft Azure (Microsoft) based on C #, C, and Java languages for developing Azure IoT (Internet of Things Platform) applications, respectively. An attacker could use this vulnerability to impersonate a server. Multiple Microsoft Azure IoT SDKs are prone to a security vulnerability that may allow attackers to conduct spoofing attacks. A man-in-the-middle attacker can exploit this issue to conduct spoofing attacks and perform unauthorized actions; other attacks are also possible
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201805-1058", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "csharp software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "c software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "java software development kit", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "*" }, { "model": "c# sdk for azure iot", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "0" }, { "model": "java sdk for azure iot", "scope": "eq", "trust": 0.9, "vendor": "microsoft", "version": "0" }, { "model": "c sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "c# sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "java sdk", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for azure iot" }, { "model": "c sdk for azure iot no", "scope": null, "trust": 0.6, "vendor": "microsoft", "version": null }, { "model": "csharp software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "java software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "c software development kit", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "azure_internet_of_things" }, { "model": "c sdk for azure iot", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:c_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:csharp_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:java_software_development_kit:*:*:*:*:*:azure_internet_of_things:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-8119" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cristian Pop, Rajeev Vokkarne, John Spaith, and Tim Taylor of Azure IoT", "sources": [ { "db": "BID", "id": "104070" } ], "trust": 0.3 }, "cve": "CVE-2018-8119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-8119", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-11134", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.2, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2018-8119", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-8119", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-11134", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201805-291", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK. Microsoft C #, C, and Java SDK for Azure IoT are software development kits for Microsoft Azure (Microsoft) based on C #, C, and Java languages for developing Azure IoT (Internet of Things Platform) applications, respectively. An attacker could use this vulnerability to impersonate a server. Multiple Microsoft Azure IoT SDKs are prone to a security vulnerability that may allow attackers to conduct spoofing attacks. \nA man-in-the-middle attacker can exploit this issue to conduct spoofing attacks and perform unauthorized actions; other attacks are also possible", "sources": [ { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "CNNVD", "id": "CNNVD-201805-291" }, { "db": "BID", "id": "104070" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-8119", "trust": 3.3 }, { "db": "BID", "id": "104070", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2018-005095", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-11134", "trust": 0.6 }, { "db": "NSFOCUS", "id": "39660", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201805-291", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "id": "VAR-201805-1058", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" } ], "trust": 1.2805555533333333 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" } ] }, "last_update_date": "2023-12-18T12:36:46.134000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2018-8119 | Azure IoT SDK Spoofing Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8119" }, { "title": "CVE-2018-8119 | Azure IoT SDK \u306e\u306a\u308a\u3059\u307e\u3057\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2018-8119" }, { "title": "Patch for Microsoft Azure IoT SDK man-in-the-middle spoofing vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/131505" }, { "title": "Microsoft C# , C and Java SDK for Azure IoT Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=79969" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8119" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/104070" }, { "trust": 1.0, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=57754\u0026vs_f=alert%20rss\u0026vs_cat=security%20intelligence\u0026vs_type=rss\u0026vs_p=microsoft%20azure%20iot%20sdk%20amqp%20transport%20library%20spoofing%20vulnerability\u0026vs_k=1" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8119" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20180509-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2018/at180021.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8119" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/39660" }, { "trust": 0.3, "url": "http://www.microsoft.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-11134" }, { "db": "BID", "id": "104070" }, { "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "db": "NVD", "id": "CVE-2018-8119" }, { "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-11134" }, { "date": "2018-05-08T00:00:00", "db": "BID", "id": "104070" }, { "date": "2018-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "date": "2018-05-09T19:29:01.230000", "db": "NVD", "id": "CVE-2018-8119" }, { "date": "2018-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-11134" }, { "date": "2018-05-08T00:00:00", "db": "BID", "id": "104070" }, { "date": "2018-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005095" }, { "date": "2018-06-18T16:39:22.387000", "db": "NVD", "id": "CVE-2018-8119" }, { "date": "2018-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-291" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-291" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Azure IoT SDK Impersonation vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005095" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-291" } ], "trust": 0.6 } }