Vulnerabilites related to cisco - vedge-1000
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104860 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104860 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751.", }, { lang: "es", value: "Una vulnerabilidad en la utilidad de línea de comandos tcpdump de Cisco SD-WAN Solution podría permitir que un atacante local autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validación de entradas insuficiente. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo y enviando entradas manipuladas a la utilidad tcpdump. El atacante debe estar autenticado para acceder a la utilidad tcpdump. Su explotación con éxito podría permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69751.", }, ], id: "CVE-2018-0351", lastModified: "2024-11-21T03:38:02.407", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.680", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104860", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104860", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104855 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104855 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914.", }, { lang: "es", value: "Una vulnerabilidad en el el servicio Zero Touch Provisioning de Cisco SD-WAN Solution podría permitir que un atacante remoto sin autenticar provoque una denegación de servicio (DoS) en un sistema afectado. La vulnerabilidad se debe a comprobaciones de límites incorrectas para ciertos valores en los paquetes que se envían al servicio Zero Touch Provisioning del sistema afectado. Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes maliciosos al software afectado para procesarlos. Cuando el software procesa los paquetes, podría ocurrir una condición de desbordamiento de búfer y provocar que el dispositivo afectado se recargue. Su explotación con éxito podría permitir que el atacante provoque una denegación de servicio (DoS) temporal mientras se reinicia el dispositivo. Esta vulnerabilidad solo puede ser explotada por tráfico destinado a un dispositivo afectado. No puede ser explotada por tráfico que transita por un dispositivo. Esta vulnerabilidad afecta a los siguientes productos Cisco si ejecutan una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69914.", }, ], id: "CVE-2018-0346", lastModified: "2024-11-21T03:38:01.710", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.447", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104855", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104855", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104874 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104874 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836.", }, { lang: "es", value: "Una vulnerabilidad en la configuración del subsistema VPN de Cisco SD-WAN Solution podría permitir que un atacante remoto autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validación de entradas insuficiente. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo y enviando entradas manipuladas al parámetro afectado en una página web. El atacante debe estar autenticado para acceder al parámetro afectado. Su explotación con éxito podría permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836.", }, ], id: "CVE-2018-0350", lastModified: "2024-11-21T03:38:02.270", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.633", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104874", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104874", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104875 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104875 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de línea de comandos de Cisco SD-WAN podría permitir que un atacante remoto autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validación de entradas insuficiente. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo y enviando entradas maliciosas al al comando load en el subsistema VPN. El atacante debe estar autenticado para acceder al parámetro de la interfaz de línea de comandos afectado. Su explotación con éxito podría permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69866.", }, ], id: "CVE-2018-0348", lastModified: "2024-11-21T03:38:01.997", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.527", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104875", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104875", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104868 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104868 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974.", }, { lang: "es", value: "Una vulnerabilidad en el panel de control vManage para el servicio de configuración y gestión de Cisco SD-WAN Solution podría permitir que un atacante remoto autenticado inyecte y ejecute comandos arbitrarios con privilegios de usuario vmanage en un sistema afectado. La vulnerabilidad se debe a una validación de entrada insuficiente de parámetros de datos para ciertos campos de la solución afectada. Un atacante podría explotar esta vulnerabilidad configurando un usuario malicioso en la página de inicio de sesión de la solución afectada. Su explotación con éxito podría permitir que el atacante inyecte y ejecute comandos arbitrarios con privilegios de usuario vmanage en un sistema afectado. Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69974.", }, ], id: "CVE-2018-0344", lastModified: "2024-11-21T03:38:01.440", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.337", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104868", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104868", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104854 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104854 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856.", }, { lang: "es", value: "Una vulnerabilidad en Cisco SD-WAN Solution podría permitir que el atacante sobrescriba archivos arbitrarios en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a la validación de entradas incorrecta del comando de petición admin-tech en la interfaz de línea de comandos del software afectado. Un atacante podría explotar esta vulnerabilidad modificando el comando de petición admin-tech en la interfaz de línea de comandos de un dispositivo afectado. Si se explota esta vulnerabilidad con éxito, el atacante podría sobrescribir archivos arbitrarios en el sistema operativo subyacente de un dispositivo afectado y escalar sus privilegios a usuario root. Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856.", }, ], id: "CVE-2018-0349", lastModified: "2024-11-21T03:38:02.130", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.587", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104854", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104854", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | sd-wan_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge-1000 | - | |
cisco | vedge-100b | - | |
cisco | vedge-2000 | - | |
cisco | vedge-5000 | - | |
cisco | vedge_100m | - | |
cisco | vedge_100wm | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "484C01EF-C2DE-43DB-8C3F-C2C013A182FE", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*", matchCriteriaId: "07E7851F-3E72-4677-B907-CF777EBED2FF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.", }, { lang: "es", value: "Una vulnerabilidad en la WebUI del Cisco SD-WAN Solution, podría permitir a un atacante remoto autenticado inyectar y ejecutar comandos arbitrarios con privilegios de usuario vmanage en un sistema afectado. La vulnerabilidad es debido a una comprobación de entrada insuficiente de los parámetros de datos para determinados campos en la solución afectada. Un atacante podría explotar esta vulnerabilidad mediante la configuración de un nombre de usuario malicioso en la página de inicio de sesión de la solución afectada. Una explotación con éxito podría permitir al atacante inyectar y ejecutar comandos arbitrarios con privilegios de usuario vmanage en un sistema afectado.", }, ], id: "CVE-2019-12629", lastModified: "2024-11-21T04:23:13.343", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, exploitabilityScore: 1.2, impactScore: 3.4, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-26T05:15:11.083", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-cmd-inject", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-cmd-inject", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104877 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104877 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003.", }, { lang: "es", value: "Una vulnerabilidad en el servicio de configuración y monitorización de Cisco SD-WAN Solution podría permitir que un atacante local autenticado ejecute código arbitrario con privilegios root o provoque una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a comprobaciones de límites incompletas para los datos proporcionados por el servicio de configuración y monitorización de la solución afectada. Un atacante podría explotar esta vulnerabilidad mediante el envío de datos maliciosos al servicio en escucha de vDaemon en un dispositivo afectado. Su explotación con éxito podría permitir que el atacante provoque un desbordamiento de búfer en el dispositivo afectado que le permitiría ejecutar código arbitrario con privilegios root o provocar que el servicio en escucha de vDaemon se recargue y resulte en una condición de denegación de servicio (DoS). Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi70003.", }, ], id: "CVE-2018-0342", lastModified: "2024-11-21T03:38:01.167", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.243", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104877", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104877", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | sd-wan_firmware | 18.4.1 | |
cisco | sd-wan_firmware | 19.1.0 | |
cisco | vedge-100 | - | |
cisco | vedge-1000 | - | |
cisco | vedge-100b | - | |
cisco | vedge-2000 | - | |
cisco | vedge-5000 | - | |
cisco | vedge_100m | - | |
cisco | vedge_100wm | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sd-wan_firmware:18.4.1:*:*:*:*:*:*:*", matchCriteriaId: "0015FD1E-1BCD-40AB-8C21-264AB9F6E123", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:sd-wan_firmware:19.1.0:*:*:*:*:*:*:*", matchCriteriaId: "7797A89F-B23B-424B-B2F7-6165C5C616FD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*", matchCriteriaId: "07E7851F-3E72-4677-B907-CF777EBED2FF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of the Cisco SD-WAN Solution vManage software could allow an authenticated, local attacker to elevate privileges to root-level privileges on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted file to the affected system. An exploit could allow the attacker to elevate privileges to root-level privileges.", }, { lang: "es", value: "Una vulnerabilidad en la CLI del software de Cisco SD-WAN Solution vManage, podría permitir a un atacante local autenticado elevar privilegios a privilegios de nivel root en el sistema operativo subyacente. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad mediante el envío de un archivo diseñado hacia el sistema afectado. Un explotación podría permitir al atacante elevar privilegios a privilegios de nivel root.", }, ], id: "CVE-2020-3115", lastModified: "2024-11-21T05:30:21.387", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2, impactScore: 6, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-26T05:15:17.193", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-priv-esc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-priv-esc", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104862 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104862 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906.", }, { lang: "es", value: "Una vulnerabilidad en el subsistema Zero Touch Provisioning (ZTP) de Cisco SD-WAN podría permitir que un atacante local autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validación de entradas insuficiente. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo y enviando entradas maliciosas al parámetro afectado. El atacante debe estar autenticado para acceder al parámetro afectado. Su explotación con éxito podría permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers y vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906.", }, ], id: "CVE-2018-0347", lastModified: "2024-11-21T03:38:01.850", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.493", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104862", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104862", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104861 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104861 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976.", }, { lang: "es", value: "Una vulnerabilidad en el servicio de configuración y gestión de Cisco SD-WAN Solution podría permitir que un atacante remoto autenticado ejecute código arbitrario con privilegios de usuario vmanage o provoque una condición de denegación de servicio (DoS) en un sistema afectado. La vulnerabilidad se debe a las restricciones de acceso insuficientes en la interfaz de gestión HTTP de la solución afectada. Un atacante podría explotar esta vulnerabilidad enviando una petición HTTP maliciosa al servicio de gestión afectado mediante un dispositivo autenticado. Su explotación con éxito podría permitir que el atacante ejecute código arbitrario con privilegios de usuario vmanage o detenga los servicios HTTP en un sistema afectado. Esta vulnerabilidad afecta a los siguientes productos Cisco si están ejecutando una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69976.", }, ], id: "CVE-2018-0343", lastModified: "2024-11-21T03:38:01.300", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.290", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104861", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104861", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | sd-wan_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge-1000 | - | |
cisco | vedge-100b | - | |
cisco | vedge-2000 | - | |
cisco | vedge-5000 | - | |
cisco | vedge_100m | - | |
cisco | vedge_100wm | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AD82EC9D-E6F5-42A7-A962-933D2F7E719C", versionEndIncluding: "17.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*", matchCriteriaId: "07E7851F-3E72-4677-B907-CF777EBED2FF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web interface for Cisco SD-WAN Solution vManage could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz web para Cisco SD-WAN Solution vManage, podría permitir a un atacante remoto autenticado impactar la integridad de un sistema afectado mediante una ejecución de consultas SQL arbitrarias. La vulnerabilidad es debido a una comprobación insuficiente de las entradas suministradas por el usuario. Un atacante podría explotar esta vulnerabilidad mediante el envío de entradas diseñadas que incluyen sentencias SQL hacia un sistema afectado. Una explotación con éxito podría permitir al atacante modificar entradas en algunas tablas de la base de datos, afectando la integridad de los datos.", }, ], id: "CVE-2019-12619", lastModified: "2024-11-21T04:23:12.100", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.1, impactScore: 2.7, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-26T05:15:10.817", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-sqlinj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-sqlinj", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/108844 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108844 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | sd-wan_firmware | * | |
cisco | sd-wan_firmware | 18.4.0 | |
cisco | vedge-100 | - | |
cisco | vedge-1000 | - | |
cisco | vedge-2000 | - | |
cisco | vedge-5000 | - | |
cisco | vedge_100b | - | |
cisco | vedge_100m | - | |
cisco | vedge_100wm | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3FA1C4A-2DC0-4595-85B9-EDEDB3E159E4", versionEndExcluding: "18.3.6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:sd-wan_firmware:18.4.0:*:*:*:*:*:*:*", matchCriteriaId: "47FEFC2B-329C-470E-A4C3-D43FF726BF08", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user.", }, { lang: "es", value: "Una vulnerabilidad en la CLI de SD-WAN Solution de Cisco podría permitir a un atacante local autenticado elevar los privilegios de nivel inferior al usuario root en un dispositivo afectado. Una vulnerabilidad es debido a la insuficiente aplicación de la autorización. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo de destino y ejecutando comandos que podrían conllevar a privilegios elevados. Una explotación con éxito podría permitir que el atacante realice cambios de configuración en el sistema como un usuario root.", }, ], id: "CVE-2019-1625", lastModified: "2024-11-21T04:36:57.527", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-06-20T03:15:11.370", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108844", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108844", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/108838 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108838 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | sd-wan_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge-1000 | - | |
cisco | vedge-100b | - | |
cisco | vedge-2000 | - | |
cisco | vedge-5000 | - | |
cisco | vedge_100m | - | |
cisco | vedge_100wm | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34DA4069-51E1-41F3-8643-E7436C0DAC6D", versionEndIncluding: "18.3.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*", matchCriteriaId: "07E7851F-3E72-4677-B907-CF777EBED2FF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de usuario basada en web (Web UI) de vManage de SD-WAN Solution de Cisco, podría permitir a un atacante remoto autenticado obtener privilegios elevados en un dispositivo vManage afectado. Una vulnerabilidad es debido a un fallo al no autorizar apropiadamente ciertas acciones del usuario en la configuración del dispositivo. Un atacante podría explotar esta vulnerabilidad iniciando sesión en la interfaz de usuario web de vManage y enviando peticiones HTTP creadas hacia vManage. Una explotación con éxito podría permitir a los atacantes obtener privilegios elevados y realizar cambios en la configuración que regularmente no estarían autorizados a realizar.", }, ], id: "CVE-2019-1626", lastModified: "2024-11-21T04:36:57.660", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-06-20T03:15:11.433", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108838", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108838", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104859 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104859 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", matchCriteriaId: "BA648664-0734-4D02-8944-CA4DF4D756D6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", matchCriteriaId: "8828CED0-5B61-4BC9-B222-2295507E5FB7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", matchCriteriaId: "937B8016-77E1-4F8C-8701-6AFFE36F6A49", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", matchCriteriaId: "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "2F16884C-A2EE-4867-8806-6418E000078C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07BDB466-E5FC-40FF-8400-836551AD4AE5", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", matchCriteriaId: "5D71E4AF-6E91-4493-A591-4D056D0E59C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "493ED5A7-3F08-4C2B-8259-F945088C42C4", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", matchCriteriaId: "0811E0B5-889E-451E-B754-A8FEE32BDFA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", matchCriteriaId: "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A124EBDB-1E4D-44FF-8647-342ACB7FC536", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", matchCriteriaId: "061A302C-8D35-4E80-93DA-916DA7E90C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F33875D3-8A95-4201-B385-FA63CCDBE103", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F718A859-BCDB-4DD0-819D-60ABE710F0A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D486E57-9E41-4744-AB0C-56B706B6989C", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "52EEF288-492C-4CE6-A082-631005C5E711", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C78995CF-3005-496D-A168-F9EEF09EEF44", versionEndExcluding: "18.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937.", }, { lang: "es", value: "Una vulnerabilidad en la base de datos de configuración y gestión de Cisco SD-WAN Solution podría permitir que un atacante remoto autenticado ejecute comandos arbitrarios con privilegios de usuario vmanage en el sistema de gestión de configuración de un sistema afectado. La vulnerabilidad se debe a una validación insuficiente de argumentos de comando que se pasan a la base de datos de configuración y gestión del software afectado. Un atacante podría explotar esta vulnerabilidad creando funciones personalizadas que contienen código malicioso y se ejecutan como el usuario vmanage del sistema de gestión de configuración. Su explotación con éxito podría permitir que el atacante ejecute comandos arbitrarios con privilegios de usuario vmanage en el sistema de gestión de configuración del sistema afectado. Esta vulnerabilidad afecta a los siguientes productos Cisco si ejecutan una versión de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69937.", }, ], id: "CVE-2018-0345", lastModified: "2024-11-21T03:38:01.573", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-18T23:29:00.383", references: [ { source: "ykramarz@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104859", }, { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104859", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-88", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2018-0346
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104855 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.451Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos", }, { name: "104855", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104855", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0346", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:43:29.505142Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:53:08.946Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-20T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos", }, { name: "104855", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104855", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0346", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos", }, { name: "104855", refsource: "BID", url: "http://www.securityfocus.com/bid/104855", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0346", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:53:08.946Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0349
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104854 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.514Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo", }, { name: "104854", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104854", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0349", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:45:32.150987Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:52:14.944Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-20T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo", }, { name: "104854", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104854", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0349", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo", }, { name: "104854", refsource: "BID", url: "http://www.securityfocus.com/bid/104854", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0349", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:52:14.944Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12629
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-cmd-inject | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN Solution |
Version: unspecified < n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.229Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200122 Cisco SD-WAN vManage Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-cmd-inject", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12629", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:30:14.162064Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:47:38.382Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2020-01-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-26T04:25:13", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200122 Cisco SD-WAN vManage Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-cmd-inject", }, ], source: { advisory: "cisco-sa-20200122-sdwan-cmd-inject", defect: [ [ "CSCvi70009", ], ], discovery: "INTERNAL", }, title: "Cisco SD-WAN vManage Command Injection Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-01-22T16:00:00-0800", ID: "CVE-2019-12629", STATE: "PUBLIC", TITLE: "Cisco SD-WAN vManage Command Injection Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "4.7", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-77", }, ], }, ], }, references: { reference_data: [ { name: "20200122 Cisco SD-WAN vManage Command Injection Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-cmd-inject", }, ], }, source: { advisory: "cisco-sa-20200122-sdwan-cmd-inject", defect: [ [ "CSCvi70009", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12629", datePublished: "2020-01-26T04:25:13.915931Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-15T17:47:38.382Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0343
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104861 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.438Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex", }, { name: "104861", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104861", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0343", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:39.524741Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:53:39.262Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-21T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex", }, { name: "104861", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104861", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0343", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex", }, { name: "104861", refsource: "BID", url: "http://www.securityfocus.com/bid/104861", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0343", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:53:39.262Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12619
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-sqlinj | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN Solution |
Version: unspecified < n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.062Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200122 Cisco SD-WAN Solution SQL Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-sqlinj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12619", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:30:11.318043Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:47:27.674Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2020-01-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web interface for Cisco SD-WAN Solution vManage could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-26T04:25:19", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200122 Cisco SD-WAN Solution SQL Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-sqlinj", }, ], source: { advisory: "cisco-sa-20200122-sdwan-sqlinj", defect: [ [ "CSCvi01888", "CSCvi56327", "CSCvi59629", ], ], discovery: "INTERNAL", }, title: "Cisco SD-WAN Solution SQL Injection Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-01-22T16:00:00-0800", ID: "CVE-2019-12619", STATE: "PUBLIC", TITLE: "Cisco SD-WAN Solution SQL Injection Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web interface for Cisco SD-WAN Solution vManage could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.4", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-89", }, ], }, ], }, references: { reference_data: [ { name: "20200122 Cisco SD-WAN Solution SQL Injection Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-sqlinj", }, ], }, source: { advisory: "cisco-sa-20200122-sdwan-sqlinj", defect: [ [ "CSCvi01888", "CSCvi56327", "CSCvi59629", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12619", datePublished: "2020-01-26T04:25:19.231969Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-15T17:47:27.674Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0351
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104860 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.580Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj", }, { name: "104860", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104860", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0351", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:30.842011Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:51:56.238Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-21T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj", }, { name: "104860", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104860", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0351", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-77", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj", }, { name: "104860", refsource: "BID", url: "http://www.securityfocus.com/bid/104860", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0351", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:51:56.238Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0347
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104862 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.582Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104862", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104862", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0347", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:35.325698Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:52:50.795Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-21T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104862", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104862", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0347", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-77", }, ], }, ], }, references: { reference_data: [ { name: "104862", refsource: "BID", url: "http://www.securityfocus.com/bid/104862", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0347", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:52:50.795Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1625
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108844 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN Solution |
Version: unspecified < 18.3.6 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:20:28.364Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190619 Cisco SD-WAN Solution Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca", }, { name: "108844", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108844", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1625", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:54:12.983001Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:17:26.265Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution", vendor: "Cisco", versions: [ { lessThan: "18.3.6", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-06-19T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "CWE-264", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-06-21T07:06:02", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190619 Cisco SD-WAN Solution Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca", }, { name: "108844", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108844", }, ], source: { advisory: "cisco-sa-20190619-sdwan-privesca", defect: [ [ "CSCvi69756", ], ], discovery: "INTERNAL", }, title: "Cisco SD-WAN Solution Privilege Escalation Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-06-19T16:00:00-0700", ID: "CVE-2019-1625", STATE: "PUBLIC", TITLE: "Cisco SD-WAN Solution Privilege Escalation Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "18.3.6", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.8", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-264", }, ], }, ], }, references: { reference_data: [ { name: "20190619 Cisco SD-WAN Solution Privilege Escalation Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca", }, { name: "108844", refsource: "BID", url: "http://www.securityfocus.com/bid/108844", }, ], }, source: { advisory: "cisco-sa-20190619-sdwan-privesca", defect: [ [ "CSCvi69756", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1625", datePublished: "2019-06-20T02:45:21.739585Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-20T17:17:26.265Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1626
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108838 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN Solution |
Version: unspecified < 18.4.0 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:20:28.349Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190619 Cisco SD-WAN Solution Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal", }, { name: "108838", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108838", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1626", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:54:14.359138Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:17:34.338Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution", vendor: "Cisco", versions: [ { lessThan: "18.4.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-06-19T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "CWE-264", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-06-21T10:06:02", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190619 Cisco SD-WAN Solution Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal", }, { name: "108838", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108838", }, ], source: { advisory: "cisco-sa-20190619-sdwan-privilescal", defect: [ [ "CSCvi69886", ], ], discovery: "INTERNAL", }, title: "Cisco SD-WAN Solution Privilege Escalation Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-06-19T16:00:00-0700", ID: "CVE-2019-1626", STATE: "PUBLIC", TITLE: "Cisco SD-WAN Solution Privilege Escalation Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "18.4.0", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-264", }, ], }, ], }, references: { reference_data: [ { name: "20190619 Cisco SD-WAN Solution Privilege Escalation Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal", }, { name: "108838", refsource: "BID", url: "http://www.securityfocus.com/bid/108838", }, ], }, source: { advisory: "cisco-sa-20190619-sdwan-privilescal", defect: [ [ "CSCvi69886", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1626", datePublished: "2019-06-20T02:45:15.427788Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-20T17:17:34.338Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0350
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104874 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.608Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104874", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104874", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0350", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:32.234981Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:52:06.737Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-25T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104874", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104874", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0350", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-77", }, ], }, ], }, references: { reference_data: [ { name: "104874", refsource: "BID", url: "http://www.securityfocus.com/bid/104874", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0350", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:52:06.737Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0348
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104875 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.493Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104875", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104875", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0348", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:33.951225Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:52:29.808Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-25T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104875", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104875", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0348", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-77", }, ], }, ], }, references: { reference_data: [ { name: "104875", refsource: "BID", url: "http://www.securityfocus.com/bid/104875", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0348", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:52:29.808Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0345
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104859 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.478Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104859", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104859", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0345", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:36.646505Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:53:18.176Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-21T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104859", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104859", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0345", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "104859", refsource: "BID", url: "http://www.securityfocus.com/bid/104859", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0345", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:53:18.176Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0344
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104868 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.486Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject", }, { name: "104868", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104868", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0344", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:38.029939Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:53:29.228Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-24T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject", }, { name: "104868", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104868", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0344", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-77", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject", }, { name: "104868", refsource: "BID", url: "http://www.securityfocus.com/bid/104868", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0344", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:53:29.228Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0342
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104877 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:21:15.506Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "104877", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104877", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0342", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-29T14:41:41.131224Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-29T14:53:48.050Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution unknown", vendor: "n/a", versions: [ { status: "affected", version: "Cisco SD-WAN Solution unknown", }, ], }, ], datePublic: "2018-07-18T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-07-25T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "104877", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104877", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0342", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution unknown", version: { version_data: [ { version_value: "Cisco SD-WAN Solution unknown", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "104877", refsource: "BID", url: "http://www.securityfocus.com/bid/104877", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0342", datePublished: "2018-07-18T23:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-29T14:53:48.050Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3115
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-priv-esc | vendor-advisory, x_refsource_CISCO |
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN Solution |
Version: unspecified < n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:24:00.527Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200122 Cisco SD-WAN Solution Local Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-priv-esc", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3115", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:25:13.213484Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:45:50.855Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2020-01-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the CLI of the Cisco SD-WAN Solution vManage software could allow an authenticated, local attacker to elevate privileges to root-level privileges on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted file to the affected system. An exploit could allow the attacker to elevate privileges to root-level privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-264", description: "CWE-264", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-26T04:31:18", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200122 Cisco SD-WAN Solution Local Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-priv-esc", }, ], source: { advisory: "cisco-sa-20200122-sdwan-priv-esc", defect: [ [ "CSCvr00305", ], ], discovery: "INTERNAL", }, title: "Cisco SD-WAN Solution Local Privilege Escalation Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-01-22T16:00:00-0800", ID: "CVE-2020-3115", STATE: "PUBLIC", TITLE: "Cisco SD-WAN Solution Local Privilege Escalation Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the CLI of the Cisco SD-WAN Solution vManage software could allow an authenticated, local attacker to elevate privileges to root-level privileges on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted file to the affected system. An exploit could allow the attacker to elevate privileges to root-level privileges.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-264", }, ], }, ], }, references: { reference_data: [ { name: "20200122 Cisco SD-WAN Solution Local Privilege Escalation Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-sdwan-priv-esc", }, ], }, source: { advisory: "cisco-sa-20200122-sdwan-priv-esc", defect: [ [ "CSCvr00305", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3115", datePublished: "2020-01-26T04:31:18.156215Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T17:45:50.855Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
var-201807-1000
Vulnerability from variot
A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937. Cisco SD-WAN Solution Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69937 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote code-execution vulnerability. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1000", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "BID", id: "104859", }, { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "NVD", id: "CVE-2018-0345", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0345", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The vendor reported this issue.", sources: [ { db: "BID", id: "104859", }, ], trust: 0.3, }, cve: "CVE-2018-0345", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "Complete", baseScore: 9, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2018-0345", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-118547", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 8.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0345", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0345", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201807-1307", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118547", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-118547", }, { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "NVD", id: "CVE-2018-0345", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937. Cisco SD-WAN Solution Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69937 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote code-execution vulnerability. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it", sources: [ { db: "NVD", id: "CVE-2018-0345", }, { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "BID", id: "104859", }, { db: "VULHUB", id: "VHN-118547", }, ], trust: 1.98, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0345", trust: 2.8, }, { db: "BID", id: "104859", trust: 2, }, { db: "JVNDB", id: "JVNDB-2018-008407", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1307", trust: 0.7, }, { db: "VULHUB", id: "VHN-118547", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-118547", }, { db: "BID", id: "104859", }, { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "NVD", id: "CVE-2018-0345", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, id: "VAR-201807-1000", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-118547", }, ], trust: 0.6159375733333333, }, last_update_date: "2023-12-18T12:28:49.016000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sdwan-cx", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cx", }, { title: "Cisco SD-WAN Solution Enter the fix for the verification vulnerability", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82208", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-88", trust: 1.1, }, { problemtype: "CWE-20", trust: 0.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118547", }, { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "NVD", id: "CVE-2018-0345", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cx", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104859", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0345", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0345", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "VULHUB", id: "VHN-118547", }, { db: "BID", id: "104859", }, { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "NVD", id: "CVE-2018-0345", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-118547", }, { db: "BID", id: "104859", }, { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "NVD", id: "CVE-2018-0345", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118547", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104859", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008407", }, { date: "2018-07-18T23:29:00.383000", db: "NVD", id: "CVE-2018-0345", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-08-28T00:00:00", db: "VULHUB", id: "VHN-118547", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104859", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008407", }, { date: "2020-08-28T19:15:21.990000", db: "NVD", id: "CVE-2018-0345", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1307", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201807-1307", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Input validation vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008407", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], trust: 1.4, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Input Validation Error", sources: [ { db: "BID", id: "104859", }, { db: "CNNVD", id: "CNNVD-201807-1307", }, ], trust: 0.9, }, }
var-201807-1004
Vulnerability from variot
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856. Vendors have confirmed this vulnerability Bug ID CSCvi69852 and CSCvi69856 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Attackers can overwrite arbitrary files on an unsuspecting user's computer in the context of the vulnerable application
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1004", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vmanage network management software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vsmart controller software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge cloud router platform", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "1000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, { model: "vsmart controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge cloud router", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "20000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14076", }, { db: "BID", id: "104854", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "NVD", id: "CVE-2018-0349", }, { db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0349", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104854", }, ], trust: 0.3, }, cve: "CVE-2018-0349", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 10, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2018-0349", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CNVD-2018-14076", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "VHN-118551", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0349", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0349", trust: 1.8, value: "CRITICAL", }, { author: "CNVD", id: "CNVD-2018-14076", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201807-1303", trust: 0.6, value: "CRITICAL", }, { author: "VULHUB", id: "VHN-118551", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2018-0349", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14076", }, { db: "VULHUB", id: "VHN-118551", }, { db: "VULMON", id: "CVE-2018-0349", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "NVD", id: "CVE-2018-0349", }, { db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856. Vendors have confirmed this vulnerability Bug ID CSCvi69852 and CSCvi69856 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. \nAttackers can overwrite arbitrary files on an unsuspecting user's computer in the context of the vulnerable application", sources: [ { db: "NVD", id: "CVE-2018-0349", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "CNVD", id: "CNVD-2018-14076", }, { db: "BID", id: "104854", }, { db: "VULHUB", id: "VHN-118551", }, { db: "VULMON", id: "CVE-2018-0349", }, ], trust: 2.61, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0349", trust: 3.5, }, { db: "BID", id: "104854", trust: 2.1, }, { db: "JVNDB", id: "JVNDB-2018-008411", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1303", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-14076", trust: 0.6, }, { db: "VULHUB", id: "VHN-118551", trust: 0.1, }, { db: "VULMON", id: "CVE-2018-0349", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14076", }, { db: "VULHUB", id: "VHN-118551", }, { db: "VULMON", id: "CVE-2018-0349", }, { db: "BID", id: "104854", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "NVD", id: "CVE-2018-0349", }, { db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, id: "VAR-201807-1004", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14076", }, { db: "VULHUB", id: "VHN-118551", }, ], trust: 1.290597024, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14076", }, ], }, last_update_date: "2023-12-18T12:18:41.413000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sdwan-fo", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-fo", }, { title: "Patch for CiscoSD-WANSolution Remote File Overwrite Vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135519", }, { title: "Cisco SD-WAN Solution Enter the fix for the verification vulnerability", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82204", }, { title: "Cisco: Cisco SD-WAN Solution Arbitrary File Overwrite Vulnerability", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180718-sdwan-fo", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14076", }, { db: "VULMON", id: "CVE-2018-0349", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-78", trust: 1.1, }, { problemtype: "CWE-20", trust: 0.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118551", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "NVD", id: "CVE-2018-0349", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-fo", }, { trust: 1.8, url: "http://www.securityfocus.com/bid/104854", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0349", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0349", }, { trust: 0.3, url: "http://www.cisco.com/", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/78.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14076", }, { db: "VULHUB", id: "VHN-118551", }, { db: "VULMON", id: "CVE-2018-0349", }, { db: "BID", id: "104854", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "NVD", id: "CVE-2018-0349", }, { db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14076", }, { db: "VULHUB", id: "VHN-118551", }, { db: "VULMON", id: "CVE-2018-0349", }, { db: "BID", id: "104854", }, { db: "JVNDB", id: "JVNDB-2018-008411", }, { db: "NVD", id: "CVE-2018-0349", }, { db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14076", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118551", }, { date: "2018-07-18T00:00:00", db: "VULMON", id: "CVE-2018-0349", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104854", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008411", }, { date: "2018-07-18T23:29:00.587000", db: "NVD", id: "CVE-2018-0349", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14076", }, { date: "2020-08-31T00:00:00", db: "VULHUB", id: "VHN-118551", }, { date: "2020-08-31T00:00:00", db: "VULMON", id: "CVE-2018-0349", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104854", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008411", }, { date: "2020-08-31T16:02:29.837000", db: "NVD", id: "CVE-2018-0349", }, { date: "2020-09-02T00:00:00", db: "CNNVD", id: "CNNVD-201807-1303", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201807-1303", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Input validation vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008411", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "operating system commend injection", sources: [ { db: "CNNVD", id: "CNNVD-201807-1303", }, ], trust: 0.6, }, }
var-201807-1002
Vulnerability from variot
A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69906 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SD-WANSolution is a set of network expansion solutions running in it. A command injection vulnerability exists in the ZeroTouchProvisioning (ZTP) subsystem in versions prior to Cisco SD-WANSolution 18.3.0, which stems from a program failing to perform input validation. Cisco SD-WAN is prone to a local command-injection vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1002", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "1000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "20000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14077", }, { db: "BID", id: "104862", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "NVD", id: "CVE-2018-0347", }, { db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0347", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104862", }, ], trust: 0.3, }, cve: "CVE-2018-0347", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.2, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2018-0347", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.1, id: "CNVD-2018-14077", impactScore: 10, integrityImpact: "COMPLETE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "VHN-118549", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:L/AC:L/AU:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0347", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0347", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-14077", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201807-1305", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118549", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14077", }, { db: "VULHUB", id: "VHN-118549", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "NVD", id: "CVE-2018-0347", }, { db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69906 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SD-WANSolution is a set of network expansion solutions running in it. A command injection vulnerability exists in the ZeroTouchProvisioning (ZTP) subsystem in versions prior to Cisco SD-WANSolution 18.3.0, which stems from a program failing to perform input validation. Cisco SD-WAN is prone to a local command-injection vulnerability", sources: [ { db: "NVD", id: "CVE-2018-0347", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "CNVD", id: "CNVD-2018-14077", }, { db: "BID", id: "104862", }, { db: "VULHUB", id: "VHN-118549", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0347", trust: 3.4, }, { db: "BID", id: "104862", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2018-008409", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1305", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-14077", trust: 0.6, }, { db: "VULHUB", id: "VHN-118549", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14077", }, { db: "VULHUB", id: "VHN-118549", }, { db: "BID", id: "104862", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "NVD", id: "CVE-2018-0347", }, { db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, id: "VAR-201807-1002", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14077", }, { db: "VULHUB", id: "VHN-118549", }, ], trust: 1.27445318, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14077", }, ], }, last_update_date: "2023-12-18T12:18:41.454000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sdwan-ci", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-ci", }, { title: "Patch for CiscoSD-WANZeroTouchProvisioning Local Command Injection Vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135521", }, { title: "Cisco SD-WAN Solution Zero Touch Provisioning Subsystem command injection vulnerability fixes", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82206", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14077", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-77", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118549", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "NVD", id: "CVE-2018-0347", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-ci", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104862", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0347", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0347", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14077", }, { db: "VULHUB", id: "VHN-118549", }, { db: "BID", id: "104862", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "NVD", id: "CVE-2018-0347", }, { db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14077", }, { db: "VULHUB", id: "VHN-118549", }, { db: "BID", id: "104862", }, { db: "JVNDB", id: "JVNDB-2018-008409", }, { db: "NVD", id: "CVE-2018-0347", }, { db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14077", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118549", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104862", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008409", }, { date: "2018-07-18T23:29:00.493000", db: "NVD", id: "CVE-2018-0347", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14077", }, { date: "2019-10-09T00:00:00", db: "VULHUB", id: "VHN-118549", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104862", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008409", }, { date: "2019-10-09T23:31:50.257000", db: "NVD", id: "CVE-2018-0347", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1305", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "BID", id: "104862", }, { db: "CNNVD", id: "CNNVD-201807-1305", }, ], trust: 0.9, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Command injection vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008409", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "command injection", sources: [ { db: "CNNVD", id: "CNNVD-201807-1305", }, ], trust: 0.6, }, }
var-201807-0998
Vulnerability from variot
A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976. Vendors have confirmed this vulnerability Bug ID CSCvi69976 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Failed exploit attempts may result in a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0998", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vmanage network management software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vsmart controller software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge cloud router platform", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "1000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14075", }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "NVD", id: "CVE-2018-0343", }, { db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0343", }, ], }, cve: "CVE-2018-0343", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 8, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "Partial", baseScore: 6.5, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2018-0343", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 8, id: "CNVD-2018-14075", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 8, id: "VHN-118545", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 8.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0343", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0343", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-14075", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201807-1309", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118545", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14075", }, { db: "VULHUB", id: "VHN-118545", }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "NVD", id: "CVE-2018-0343", }, { db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976. Vendors have confirmed this vulnerability Bug ID CSCvi69976 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Failed exploit attempts may result in a denial-of-service condition", sources: [ { db: "NVD", id: "CVE-2018-0343", }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "CNVD", id: "CNVD-2018-14075", }, { db: "BID", id: 104861, }, { db: "VULHUB", id: "VHN-118545", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0343", trust: 3.1, }, { db: "BID", id: "104861", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2018-008576", trust: 0.8, }, { db: "CNVD", id: "CNVD-2018-14075", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201807-1309", trust: 0.6, }, { db: "VULHUB", id: "VHN-118545", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14075", }, { db: "VULHUB", id: "VHN-118545", }, { db: "BID", id: 104861, }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "NVD", id: "CVE-2018-0343", }, { db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, id: "VAR-201807-0998", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14075", }, { db: "VULHUB", id: "VHN-118545", }, ], trust: 1.290597024, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14075", }, ], }, last_update_date: "2023-12-18T13:33:48.194000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sd-wan-code-ex", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-code-ex", }, { title: "Patch for CiscoSD-WANSolution Remote Code Execution Vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135527", }, { title: "Cisco SD-WAN Solution Fixes for access control error vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82210", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14075", }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-269", trust: 1.1, }, { problemtype: "CWE-284", trust: 0.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118545", }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "NVD", id: "CVE-2018-0343", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-code-ex", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104861", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0343", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0343", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14075", }, { db: "VULHUB", id: "VHN-118545", }, { db: "BID", id: 104861, }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "NVD", id: "CVE-2018-0343", }, { db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14075", }, { db: "VULHUB", id: "VHN-118545", }, { db: "BID", id: 104861, }, { db: "JVNDB", id: "JVNDB-2018-008576", }, { db: "NVD", id: "CVE-2018-0343", }, { db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14075", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118545", }, { date: "2018-10-23T00:00:00", db: "JVNDB", id: "JVNDB-2018-008576", }, { date: "2018-07-18T23:29:00.290000", db: "NVD", id: "CVE-2018-0343", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14075", }, { date: "2019-10-09T00:00:00", db: "VULHUB", id: "VHN-118545", }, { date: "2018-10-23T00:00:00", db: "JVNDB", id: "JVNDB-2018-008576", }, { date: "2019-10-09T23:31:49.317000", db: "NVD", id: "CVE-2018-0343", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1309", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201807-1309", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Access control vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008576", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "access control error", sources: [ { db: "CNNVD", id: "CNNVD-201807-1309", }, ], trust: 0.6, }, }
var-201807-0999
Vulnerability from variot
A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69974 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0999", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge series routers", scope: "eq", trust: 0.9, vendor: "cisco", version: "1000", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vmanage network management software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vsmart controller software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge cloud router platform", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, { model: "vsmart controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge cloud router", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "20000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14079", }, { db: "BID", id: "104868", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "NVD", id: "CVE-2018-0344", }, { db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0344", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104868", }, ], trust: 0.3, }, cve: "CVE-2018-0344", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 8, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "Partial", baseScore: 6.5, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2018-0344", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CNVD-2018-14079", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 8, id: "VHN-118546", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.2, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.2, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0344", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0344", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-14079", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201807-1308", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118546", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14079", }, { db: "VULHUB", id: "VHN-118546", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "NVD", id: "CVE-2018-0344", }, { db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69974 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it", sources: [ { db: "NVD", id: "CVE-2018-0344", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "CNVD", id: "CNVD-2018-14079", }, { db: "BID", id: "104868", }, { db: "VULHUB", id: "VHN-118546", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0344", trust: 3.4, }, { db: "BID", id: "104868", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2018-008406", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1308", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-14079", trust: 0.6, }, { db: "VULHUB", id: "VHN-118546", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14079", }, { db: "VULHUB", id: "VHN-118546", }, { db: "BID", id: "104868", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "NVD", id: "CVE-2018-0344", }, { db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, id: "VAR-201807-0999", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14079", }, { db: "VULHUB", id: "VHN-118546", }, ], trust: 1.290597024, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14079", }, ], }, last_update_date: "2023-12-18T13:02:33.266000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sd-wan-cmd-inject", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-cmd-inject", }, { title: "Patch for CiscoSD-WANSolution Remote Command Injection Vulnerability (CNVD-2018-14079)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135525", }, { title: "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82209", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14079", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-77", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118546", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "NVD", id: "CVE-2018-0344", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-cmd-inject", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104868", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0344", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0344", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14079", }, { db: "VULHUB", id: "VHN-118546", }, { db: "BID", id: "104868", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "NVD", id: "CVE-2018-0344", }, { db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14079", }, { db: "VULHUB", id: "VHN-118546", }, { db: "BID", id: "104868", }, { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "NVD", id: "CVE-2018-0344", }, { db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14079", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118546", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104868", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008406", }, { date: "2018-07-18T23:29:00.337000", db: "NVD", id: "CVE-2018-0344", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14079", }, { date: "2019-10-09T00:00:00", db: "VULHUB", id: "VHN-118546", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104868", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008406", }, { date: "2019-10-09T23:31:49.553000", db: "NVD", id: "CVE-2018-0344", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1308", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201807-1308", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Command injection vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008406", }, { db: "CNNVD", id: "CNNVD-201807-1308", }, ], trust: 1.4, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "command injection", sources: [ { db: "CNNVD", id: "CNNVD-201807-1308", }, ], trust: 0.6, }, }
var-201807-1001
Vulnerability from variot
A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69914 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote denial-of-service vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1001", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "BID", id: "104855", }, { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "NVD", id: "CVE-2018-0346", }, { db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0346", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104855", }, ], trust: 0.3, }, cve: "CVE-2018-0346", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.8, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2018-0346", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-118548", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2018-0346", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0346", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201807-1306", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118548", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-118548", }, { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "NVD", id: "CVE-2018-0346", }, { db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69914 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote denial-of-service vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it", sources: [ { db: "NVD", id: "CVE-2018-0346", }, { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "BID", id: "104855", }, { db: "VULHUB", id: "VHN-118548", }, ], trust: 1.98, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0346", trust: 2.8, }, { db: "BID", id: "104855", trust: 2, }, { db: "JVNDB", id: "JVNDB-2018-008408", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1306", trust: 0.7, }, { db: "VULHUB", id: "VHN-118548", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-118548", }, { db: "BID", id: "104855", }, { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "NVD", id: "CVE-2018-0346", }, { db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, id: "VAR-201807-1001", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-118548", }, ], trust: 0.6159375733333333, }, last_update_date: "2023-12-18T12:43:59.075000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sdwan-dos", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-dos", }, { title: "Cisco SD-WAN Solution Buffer error vulnerability fix", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82207", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118548", }, { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "NVD", id: "CVE-2018-0346", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-dos", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104855", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0346", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0346", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "VULHUB", id: "VHN-118548", }, { db: "BID", id: "104855", }, { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "NVD", id: "CVE-2018-0346", }, { db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-118548", }, { db: "BID", id: "104855", }, { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "NVD", id: "CVE-2018-0346", }, { db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118548", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104855", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008408", }, { date: "2018-07-18T23:29:00.447000", db: "NVD", id: "CVE-2018-0346", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-10-09T00:00:00", db: "VULHUB", id: "VHN-118548", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104855", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008408", }, { date: "2019-10-09T23:31:50.007000", db: "NVD", id: "CVE-2018-0346", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1306", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201807-1306", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Buffer error vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008408", }, { db: "CNNVD", id: "CNNVD-201807-1306", }, ], trust: 1.4, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-201807-1306", }, ], trust: 0.6, }, }
var-201807-1003
Vulnerability from variot
A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69866 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. A CLI injection vulnerability exists in the CLI in versions prior to Cisco SD-WANSolution 18.3.0, which was caused by the program failing to perform sufficient input validation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1003", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge series routers", scope: "eq", trust: 0.9, vendor: "cisco", version: "1000", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vmanage network management software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vsmart controller software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge cloud router platform", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, { model: "vsmart controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge cloud router", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "20000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14074", }, { db: "BID", id: "104875", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "NVD", id: "CVE-2018-0348", }, { db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0348", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104875", }, ], trust: 0.3, }, cve: "CVE-2018-0348", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "Complete", baseScore: 9, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2018-0348", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CNVD-2018-14074", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-118550", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.2, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.2, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0348", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0348", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-14074", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201807-1304", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118550", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14074", }, { db: "VULHUB", id: "VHN-118550", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "NVD", id: "CVE-2018-0348", }, { db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69866 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. A CLI injection vulnerability exists in the CLI in versions prior to Cisco SD-WANSolution 18.3.0, which was caused by the program failing to perform sufficient input validation", sources: [ { db: "NVD", id: "CVE-2018-0348", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "CNVD", id: "CNVD-2018-14074", }, { db: "BID", id: "104875", }, { db: "VULHUB", id: "VHN-118550", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0348", trust: 3.4, }, { db: "BID", id: "104875", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2018-008410", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1304", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-14074", trust: 0.6, }, { db: "VULHUB", id: "VHN-118550", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14074", }, { db: "VULHUB", id: "VHN-118550", }, { db: "BID", id: "104875", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "NVD", id: "CVE-2018-0348", }, { db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, id: "VAR-201807-1003", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14074", }, { db: "VULHUB", id: "VHN-118550", }, ], trust: 1.290597024, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14074", }, ], }, last_update_date: "2023-12-18T13:24:00.323000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sdwan-cmdnjct", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdnjct", }, { title: "Patch for CiscoSD-WANSolution Remote Command Injection Vulnerability (CNVD-2018-14074)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135517", }, { title: "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82205", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14074", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-78", trust: 1.1, }, { problemtype: "CWE-77", trust: 0.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118550", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "NVD", id: "CVE-2018-0348", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdnjct", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104875", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0348", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0348", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14074", }, { db: "VULHUB", id: "VHN-118550", }, { db: "BID", id: "104875", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "NVD", id: "CVE-2018-0348", }, { db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14074", }, { db: "VULHUB", id: "VHN-118550", }, { db: "BID", id: "104875", }, { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "NVD", id: "CVE-2018-0348", }, { db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14074", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118550", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104875", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008410", }, { date: "2018-07-18T23:29:00.527000", db: "NVD", id: "CVE-2018-0348", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14074", }, { date: "2020-08-31T00:00:00", db: "VULHUB", id: "VHN-118550", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104875", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008410", }, { date: "2020-08-31T16:01:54.273000", db: "NVD", id: "CVE-2018-0348", }, { date: "2020-09-02T00:00:00", db: "CNNVD", id: "CNNVD-201807-1304", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201807-1304", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Command injection vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008410", }, { db: "CNNVD", id: "CNNVD-201807-1304", }, ], trust: 1.4, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "operating system commend injection", sources: [ { db: "CNNVD", id: "CNNVD-201807-1304", }, ], trust: 0.6, }, }
var-201807-1005
Vulnerability from variot
A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors report this vulnerability CSCvi69808 , CSCvi69810 , CSCvi69814 , CSCvi69822 , CSCvi69827 , CSCvi69828 ,and CSCvi69836 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1005", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge series routers", scope: "eq", trust: 0.9, vendor: "cisco", version: "1000", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vmanage network management software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vsmart controller software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge cloud router platform", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, { model: "vsmart controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge cloud router", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "20000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14083", }, { db: "BID", id: "104874", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "NVD", id: "CVE-2018-0350", }, { db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0350", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104874", }, ], trust: 0.3, }, cve: "CVE-2018-0350", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "Complete", baseScore: 9, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2018-0350", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "CNVD-2018-14083", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-118552", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 8.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0350", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0350", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-14083", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201807-1302", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118552", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14083", }, { db: "VULHUB", id: "VHN-118552", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "NVD", id: "CVE-2018-0350", }, { db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors report this vulnerability CSCvi69808 , CSCvi69810 , CSCvi69814 , CSCvi69822 , CSCvi69827 , CSCvi69828 ,and CSCvi69836 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it", sources: [ { db: "NVD", id: "CVE-2018-0350", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "CNVD", id: "CNVD-2018-14083", }, { db: "BID", id: "104874", }, { db: "VULHUB", id: "VHN-118552", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0350", trust: 3.4, }, { db: "BID", id: "104874", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2018-008577", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1302", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-14083", trust: 0.6, }, { db: "VULHUB", id: "VHN-118552", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14083", }, { db: "VULHUB", id: "VHN-118552", }, { db: "BID", id: "104874", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "NVD", id: "CVE-2018-0350", }, { db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, id: "VAR-201807-1005", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14083", }, { db: "VULHUB", id: "VHN-118552", }, ], trust: 1.290597024, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14083", }, ], }, last_update_date: "2023-12-18T13:56:57.698000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sdwan-cmdinj", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdinj", }, { title: "CiscoSD-WANSolution Remote Command Injection Vulnerability Patch", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135531", }, { title: "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82203", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14083", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-77", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118552", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "NVD", id: "CVE-2018-0350", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdinj", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104874", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0350", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0350", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14083", }, { db: "VULHUB", id: "VHN-118552", }, { db: "BID", id: "104874", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "NVD", id: "CVE-2018-0350", }, { db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14083", }, { db: "VULHUB", id: "VHN-118552", }, { db: "BID", id: "104874", }, { db: "JVNDB", id: "JVNDB-2018-008577", }, { db: "NVD", id: "CVE-2018-0350", }, { db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14083", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118552", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104874", }, { date: "2018-10-23T00:00:00", db: "JVNDB", id: "JVNDB-2018-008577", }, { date: "2018-07-18T23:29:00.633000", db: "NVD", id: "CVE-2018-0350", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14083", }, { date: "2019-10-09T00:00:00", db: "VULHUB", id: "VHN-118552", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104874", }, { date: "2018-10-23T00:00:00", db: "JVNDB", id: "JVNDB-2018-008577", }, { date: "2019-10-09T23:31:51.007000", db: "NVD", id: "CVE-2018-0350", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1302", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201807-1302", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Vulnerable to command injection", sources: [ { db: "JVNDB", id: "JVNDB-2018-008577", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "command injection", sources: [ { db: "CNNVD", id: "CNNVD-201807-1302", }, ], trust: 0.6, }, }
var-201807-0997
Vulnerability from variot
A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi70003 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN Solution is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0997", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge series routers", scope: "eq", trust: 0.9, vendor: "cisco", version: "1000", }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vmanage network management software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vsmart controller software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge cloud router platform", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, { model: "vsmart controller software", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge cloud router", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "20000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14082", }, { db: "BID", id: "104877", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "NVD", id: "CVE-2018-0342", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0342", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104877", }, ], trust: 0.3, }, cve: "CVE-2018-0342", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.2, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2018-0342", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.1, id: "CNVD-2018-14082", impactScore: 10, integrityImpact: "COMPLETE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "VHN-118544", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:L/AC:L/AU:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 6.7, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0342", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0342", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2018-14082", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201807-1310", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-118544", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14082", }, { db: "VULHUB", id: "VHN-118544", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "NVD", id: "CVE-2018-0342", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi70003 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN Solution is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer", sources: [ { db: "NVD", id: "CVE-2018-0342", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "CNVD", id: "CNVD-2018-14082", }, { db: "BID", id: "104877", }, { db: "VULHUB", id: "VHN-118544", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0342", trust: 3.4, }, { db: "BID", id: "104877", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2018-008575", trust: 0.8, }, { db: "CNVD", id: "CNVD-2018-14082", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201807-1310", trust: 0.6, }, { db: "VULHUB", id: "VHN-118544", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14082", }, { db: "VULHUB", id: "VHN-118544", }, { db: "BID", id: "104877", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "NVD", id: "CVE-2018-0342", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, id: "VAR-201807-0997", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14082", }, { db: "VULHUB", id: "VHN-118544", }, ], trust: 1.290597024, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14082", }, ], }, last_update_date: "2023-12-18T13:52:35.159000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sd-wan-bo", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-bo", }, { title: "Patch for CiscoSD-WANSolution Local Buffer Overflow Vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135535", }, { title: "Cisco SD-WAN Solution Buffer error vulnerability fix", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82211", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14082", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118544", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "NVD", id: "CVE-2018-0342", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-bo", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104877", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0342", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0342", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14082", }, { db: "VULHUB", id: "VHN-118544", }, { db: "BID", id: "104877", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "NVD", id: "CVE-2018-0342", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14082", }, { db: "VULHUB", id: "VHN-118544", }, { db: "BID", id: "104877", }, { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "NVD", id: "CVE-2018-0342", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14082", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118544", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104877", }, { date: "2018-10-23T00:00:00", db: "JVNDB", id: "JVNDB-2018-008575", }, { date: "2018-07-18T23:29:00.243000", db: "NVD", id: "CVE-2018-0342", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14082", }, { date: "2019-10-09T00:00:00", db: "VULHUB", id: "VHN-118544", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104877", }, { date: "2018-10-23T00:00:00", db: "JVNDB", id: "JVNDB-2018-008575", }, { date: "2019-10-09T23:31:49.053000", db: "NVD", id: "CVE-2018-0342", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1310", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "BID", id: "104877", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], trust: 0.9, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Buffer error vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008575", }, { db: "CNNVD", id: "CNNVD-201807-1310", }, ], trust: 1.4, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-201807-1310", }, ], trust: 0.6, }, }
var-201807-1006
Vulnerability from variot
A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69751 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1006", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vedge-plus", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: "eq", trust: 1.6, vendor: "cisco", version: null, }, { model: "vedge-1000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-5000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100b", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100wm", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-2000", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge-100", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "vedge 100m", scope: "lt", trust: 1, vendor: "cisco", version: "18.3.0", }, { model: "mobility services engine", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 1000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100b", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100m", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 100wm", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 2000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge 5000", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-plus", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vedge-pro", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vmanage network management", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vsmart controller", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "vbond orchestrator software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vmanage network management software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vsmart controller software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge cloud router platform", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "2000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "1000", }, { model: "vedge series routers", scope: "eq", trust: 0.6, vendor: "cisco", version: "100", }, { model: "vsmart controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vmanage network management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge cloud router", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "20000", }, { model: "vedge", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "vbond orchestrator", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "sd-wan", scope: "ne", trust: 0.3, vendor: "cisco", version: "18.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14110", }, { db: "BID", id: "104860", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "NVD", id: "CVE-2018-0351", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "18.3.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2018-0351", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco", sources: [ { db: "BID", id: "104860", }, ], trust: 0.3, }, cve: "CVE-2018-0351", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: true, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.2, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2018-0351", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.1, id: "CNVD-2018-14110", impactScore: 10, integrityImpact: "COMPLETE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "VHN-118553", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:L/AC:L/AU:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-0351", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2018-0351", trust: 1.8, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-14110", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201807-1301", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-118553", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14110", }, { db: "VULHUB", id: "VHN-118553", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "NVD", id: "CVE-2018-0351", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69751 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability", sources: [ { db: "NVD", id: "CVE-2018-0351", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "CNVD", id: "CNVD-2018-14110", }, { db: "BID", id: "104860", }, { db: "VULHUB", id: "VHN-118553", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-0351", trust: 3.4, }, { db: "BID", id: "104860", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2018-008389", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201807-1301", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-14110", trust: 0.6, }, { db: "VULHUB", id: "VHN-118553", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14110", }, { db: "VULHUB", id: "VHN-118553", }, { db: "BID", id: "104860", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "NVD", id: "CVE-2018-0351", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, id: "VAR-201807-1006", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-14110", }, { db: "VULHUB", id: "VHN-118553", }, ], trust: 1.290597024, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14110", }, ], }, last_update_date: "2023-12-18T13:28:50.378000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-20180718-sdwan-coinj", trust: 0.8, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-coinj", }, { title: "CiscoSD-WANSolution Local Command Injection Vulnerability Patch", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/135529", }, { title: "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82202", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14110", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-77", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-118553", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "NVD", id: "CVE-2018-0351", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-coinj", }, { trust: 1.7, url: "http://www.securityfocus.com/bid/104860", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-0351", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0351", }, { trust: 0.3, url: "http://www.cisco.com/", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-14110", }, { db: "VULHUB", id: "VHN-118553", }, { db: "BID", id: "104860", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "NVD", id: "CVE-2018-0351", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-14110", }, { db: "VULHUB", id: "VHN-118553", }, { db: "BID", id: "104860", }, { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "NVD", id: "CVE-2018-0351", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14110", }, { date: "2018-07-18T00:00:00", db: "VULHUB", id: "VHN-118553", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104860", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008389", }, { date: "2018-07-18T23:29:00.680000", db: "NVD", id: "CVE-2018-0351", }, { date: "2018-07-19T00:00:00", db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-07-27T00:00:00", db: "CNVD", id: "CNVD-2018-14110", }, { date: "2019-10-09T00:00:00", db: "VULHUB", id: "VHN-118553", }, { date: "2018-07-18T00:00:00", db: "BID", id: "104860", }, { date: "2018-10-16T00:00:00", db: "JVNDB", id: "JVNDB-2018-008389", }, { date: "2019-10-09T23:31:51.223000", db: "NVD", id: "CVE-2018-0351", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201807-1301", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "BID", id: "104860", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], trust: 0.9, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco SD-WAN Solution Command injection vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2018-008389", }, { db: "CNNVD", id: "CNNVD-201807-1301", }, ], trust: 1.4, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "command injection", sources: [ { db: "CNNVD", id: "CNNVD-201807-1301", }, ], trust: 0.6, }, }