{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
affected_products: {
"@id": "https://www.variotdbs.pl/ref/affected_products",
},
configurations: {
"@id": "https://www.variotdbs.pl/ref/configurations",
},
credits: {
"@id": "https://www.variotdbs.pl/ref/credits",
},
cvss: {
"@id": "https://www.variotdbs.pl/ref/cvss/",
},
description: {
"@id": "https://www.variotdbs.pl/ref/description/",
},
exploit_availability: {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/",
},
external_ids: {
"@id": "https://www.variotdbs.pl/ref/external_ids/",
},
iot: {
"@id": "https://www.variotdbs.pl/ref/iot/",
},
iot_taxonomy: {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
},
patch: {
"@id": "https://www.variotdbs.pl/ref/patch/",
},
problemtype_data: {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/",
},
references: {
"@id": "https://www.variotdbs.pl/ref/references/",
},
sources: {
"@id": "https://www.variotdbs.pl/ref/sources/",
},
sources_release_date: {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/",
},
sources_update_date: {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/",
},
threat_type: {
"@id": "https://www.variotdbs.pl/ref/threat_type/",
},
title: {
"@id": "https://www.variotdbs.pl/ref/title/",
},
type: {
"@id": "https://www.variotdbs.pl/ref/type/",
},
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201806-1043",
affected_products: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
"@id": "https://www.variotdbs.pl/ref/sources",
},
},
data: [
{
model: "ucs-e140dp-k9",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e140dp-m1",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e140d-m1",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e160dp-m1",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e140s-k9",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e160dp-k9",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e160d-m1",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e140d-k9",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e140s-m1",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e160d-k9",
scope: "eq",
trust: 1.6,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "5400 enterprise network compute system",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e180d-m2",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e160d-m2",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e180d-k9",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e160s-k9",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e1120d-m3",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "5100 enterprise network compute system",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e180d-m3",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e1120d-k9",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e160s-m3",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "ucs-e140s-m2",
scope: "eq",
trust: 1,
vendor: "cisco",
version: "3.2\\(3\\)",
},
{
model: "5000 enterprise network compute system",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "5100 enterprise network compute system",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e1120d-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e1120d-m3",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e140d-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e140d-m1",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e140dp-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e140dp-m1",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e140s-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e140s-m1",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e140s-m2",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e160d-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e160d-m1",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e160d-m2",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e160dp-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e160dp-m1",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e160s-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e160s-m3",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e180d-k9",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e180d-m2",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "ucs-e180d-m3",
scope: null,
trust: 0.8,
vendor: "cisco",
version: null,
},
{
model: "series enterprise network compute system",
scope: "eq",
trust: 0.6,
vendor: "cisco",
version: "50000",
},
{
model: "unified computing e-series servers",
scope: null,
trust: 0.6,
vendor: "cisco",
version: null,
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "NVD",
id: "CVE-2018-0362",
},
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
configurations: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
children: {
"@container": "@list",
},
cpe_match: {
"@container": "@list",
},
data: {
"@container": "@list",
},
nodes: {
"@container": "@list",
},
},
data: [
{
CVE_data_version: "4.0",
nodes: [
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:5400_enterprise_network_compute_system_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:5400_enterprise_network_compute_system:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:5100_enterprise_network_compute_system_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:5100_enterprise_network_compute_system:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160s-m3_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160s-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160s-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e180d-m3_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e180d-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e180d-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e1120d-m3_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e1120d-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e1120d-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140s-m2_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140s-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140s-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160d-m2_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160d-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160d-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e180d-m2_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e180d-m2:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e180d-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e180d-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140s-m1_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140s-m1:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140s-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140s-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160d-m1_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160d-m1:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160d-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160d-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160dp-m1_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160dp-m1:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e160dp-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e160dp-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140d-m1_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140d-m1:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140d-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140d-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140dp-m1_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140dp-m1:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
{
children: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:o:cisco:ucs-e140dp-k9_firmware:3.2\\(3\\):*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:h:cisco:ucs-e140dp-k9:-:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: false,
},
],
operator: "OR",
},
],
cpe_match: [],
operator: "AND",
},
],
},
],
sources: [
{
db: "NVD",
id: "CVE-2018-0362",
},
],
},
cve: "CVE-2018-0362",
cvss: {
"@context": {
cvssV2: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
},
cvssV3: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
},
severity: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
"@id": "https://www.variotdbs.pl/ref/sources",
},
},
data: [
{
cvssV2: [
{
acInsufInfo: false,
accessComplexity: "LOW",
accessVector: "LOCAL",
authentication: "NONE",
author: "NVD",
availabilityImpact: "PARTIAL",
baseScore: 4.6,
confidentialityImpact: "PARTIAL",
exploitabilityScore: 3.9,
impactScore: 6.4,
integrityImpact: "PARTIAL",
obtainAllPrivilege: false,
obtainOtherPrivilege: false,
obtainUserPrivilege: false,
severity: "MEDIUM",
trust: 1,
userInteractionRequired: false,
vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
version: "2.0",
},
{
acInsufInfo: null,
accessComplexity: "Low",
accessVector: "Local",
authentication: "None",
author: "NVD",
availabilityImpact: "Partial",
baseScore: 4.6,
confidentialityImpact: "Partial",
exploitabilityScore: null,
id: "CVE-2018-0362",
impactScore: null,
integrityImpact: "Partial",
obtainAllPrivilege: null,
obtainOtherPrivilege: null,
obtainUserPrivilege: null,
severity: "Medium",
trust: 0.8,
userInteractionRequired: null,
vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
version: "2.0",
},
{
accessComplexity: "LOW",
accessVector: "LOCAL",
authentication: "NONE",
author: "CNVD",
availabilityImpact: "PARTIAL",
baseScore: 4.6,
confidentialityImpact: "PARTIAL",
exploitabilityScore: 3.9,
id: "CNVD-2018-14575",
impactScore: 6.4,
integrityImpact: "PARTIAL",
severity: "MEDIUM",
trust: 0.6,
vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
version: "2.0",
},
{
accessComplexity: "LOW",
accessVector: "LOCAL",
authentication: "NONE",
author: "VULHUB",
availabilityImpact: "PARTIAL",
baseScore: 4.6,
confidentialityImpact: "PARTIAL",
exploitabilityScore: 3.9,
id: "VHN-118564",
impactScore: 6.4,
integrityImpact: "PARTIAL",
severity: "MEDIUM",
trust: 0.1,
vectorString: "AV:L/AC:L/AU:N/C:P/I:P/A:P",
version: "2.0",
},
],
cvssV3: [
{
attackComplexity: "LOW",
attackVector: "PHYSICAL",
author: "NVD",
availabilityImpact: "LOW",
baseScore: 4.3,
baseSeverity: "MEDIUM",
confidentialityImpact: "LOW",
exploitabilityScore: 0.9,
impactScore: 3.4,
integrityImpact: "LOW",
privilegesRequired: "NONE",
scope: "UNCHANGED",
trust: 1,
userInteraction: "NONE",
vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
version: "3.0",
},
{
attackComplexity: "Low",
attackVector: "Physical",
author: "NVD",
availabilityImpact: "Low",
baseScore: 4.3,
baseSeverity: "Medium",
confidentialityImpact: "Low",
exploitabilityScore: null,
id: "CVE-2018-0362",
impactScore: null,
integrityImpact: "Low",
privilegesRequired: "None",
scope: "Unchanged",
trust: 0.8,
userInteraction: "None",
vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
version: "3.0",
},
],
severity: [
{
author: "NVD",
id: "CVE-2018-0362",
trust: 1.8,
value: "MEDIUM",
},
{
author: "CNVD",
id: "CNVD-2018-14575",
trust: 0.6,
value: "MEDIUM",
},
{
author: "CNNVD",
id: "CNNVD-201806-1115",
trust: 0.6,
value: "MEDIUM",
},
{
author: "VULHUB",
id: "VHN-118564",
trust: 0.1,
value: "MEDIUM",
},
],
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "VULHUB",
id: "VHN-118564",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "NVD",
id: "CVE-2018-0362",
},
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
description: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "A vulnerability in BIOS authentication management of Cisco 5000 Series Enterprise Network Compute System and Cisco Unified Computing (UCS) E-Series Servers could allow an unauthenticated, local attacker to bypass the BIOS authentication and execute actions as an unprivileged user. The vulnerability is due to improper security restrictions that are imposed by the affected system. An attacker could exploit this vulnerability by submitting an empty password value to an affected device's BIOS authentication prompt. An exploit could allow the attacker to have access to a restricted set of user-level BIOS commands. Cisco Bug IDs: CSCvh83260. Vendors have confirmed this vulnerability Bug ID CSCvh83260 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. UCSE-SeriesServers is a data center-class blade server device",
sources: [
{
db: "NVD",
id: "CVE-2018-0362",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "VULHUB",
id: "VHN-118564",
},
],
trust: 2.25,
},
external_ids: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
db: "NVD",
id: "CVE-2018-0362",
trust: 3.1,
},
{
db: "SECTRACK",
id: "1041173",
trust: 1.7,
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
trust: 0.8,
},
{
db: "CNNVD",
id: "CNNVD-201806-1115",
trust: 0.7,
},
{
db: "CNVD",
id: "CNVD-2018-14575",
trust: 0.6,
},
{
db: "VULHUB",
id: "VHN-118564",
trust: 0.1,
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "VULHUB",
id: "VHN-118564",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "NVD",
id: "CVE-2018-0362",
},
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
id: "VAR-201806-1043",
iot: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: true,
sources: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "VULHUB",
id: "VHN-118564",
},
],
trust: 1.5125,
},
iot_taxonomy: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
category: [
"Network device",
],
sub_category: null,
trust: 0.6,
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
],
},
last_update_date: "2023-12-18T12:44:01.266000Z",
patch: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
title: "cisco-sa-20180620-encs-ucs-bios-auth-bypass",
trust: 0.8,
url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180620-encs-ucs-bios-auth-bypass",
},
{
title: "Cisco 5000 Series Enterprise Network Compute System and UCSE-SeriesServers authentication bypass vulnerability patches",
trust: 0.6,
url: "https://www.cnvd.org.cn/patchinfo/show/136329",
},
{
title: "Cisco 5000 Series Enterprise Network Compute System and UCS E-Series Servers Remediation measures for authorization problem vulnerabilities",
trust: 0.6,
url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=81447",
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
problemtype_data: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
problemtype: "CWE-287",
trust: 1.9,
},
],
sources: [
{
db: "VULHUB",
id: "VHN-118564",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "NVD",
id: "CVE-2018-0362",
},
],
},
references: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
trust: 1.7,
url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180620-encs-ucs-bios-auth-bypass",
},
{
trust: 1.7,
url: "http://www.securitytracker.com/id/1041173",
},
{
trust: 0.8,
url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0362",
},
{
trust: 0.8,
url: "https://nvd.nist.gov/vuln/detail/cve-2018-0362",
},
{
trust: 0.6,
url: "https://bst.cloudapps.cisco.com/bugsearch/bug/cscvh83260",
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "VULHUB",
id: "VHN-118564",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "NVD",
id: "CVE-2018-0362",
},
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
sources: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
data: {
"@container": "@list",
},
},
data: [
{
db: "CNVD",
id: "CNVD-2018-14575",
},
{
db: "VULHUB",
id: "VHN-118564",
},
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
db: "NVD",
id: "CVE-2018-0362",
},
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
sources_release_date: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
data: {
"@container": "@list",
},
},
data: [
{
date: "2018-08-03T00:00:00",
db: "CNVD",
id: "CNVD-2018-14575",
},
{
date: "2018-06-21T00:00:00",
db: "VULHUB",
id: "VHN-118564",
},
{
date: "2018-08-27T00:00:00",
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
date: "2018-06-21T11:29:00.977000",
db: "NVD",
id: "CVE-2018-0362",
},
{
date: "2018-06-22T00:00:00",
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
sources_update_date: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
data: {
"@container": "@list",
},
},
data: [
{
date: "2018-08-03T00:00:00",
db: "CNVD",
id: "CNVD-2018-14575",
},
{
date: "2019-10-09T00:00:00",
db: "VULHUB",
id: "VHN-118564",
},
{
date: "2018-08-27T00:00:00",
db: "JVNDB",
id: "JVNDB-2018-006586",
},
{
date: "2019-10-09T23:31:52.397000",
db: "NVD",
id: "CVE-2018-0362",
},
{
date: "2019-10-17T00:00:00",
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
},
threat_type: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "local",
sources: [
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
trust: 0.6,
},
title: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "Cisco 5000 Series Enterprise Network Compute System and Unified Computing E-Series Server Authentication vulnerability",
sources: [
{
db: "JVNDB",
id: "JVNDB-2018-006586",
},
],
trust: 0.8,
},
type: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "authorization issue",
sources: [
{
db: "CNNVD",
id: "CNNVD-201806-1115",
},
],
trust: 0.6,
},
}