All the vulnerabilites related to cisco - vedge-plus
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104862 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104862 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906." }, { "lang": "es", "value": "Una vulnerabilidad en el subsistema Zero Touch Provisioning (ZTP) de Cisco SD-WAN podr\u00eda permitir que un atacante local autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validaci\u00f3n de entradas insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el dispositivo y enviando entradas maliciosas al par\u00e1metro afectado. El atacante debe estar autenticado para acceder al par\u00e1metro afectado. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers y vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906." } ], "id": "CVE-2018-0347", "lastModified": "2024-11-21T03:38:01.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.493", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104862" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104868 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104868 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974." }, { "lang": "es", "value": "Una vulnerabilidad en el panel de control vManage para el servicio de configuraci\u00f3n y gesti\u00f3n de Cisco SD-WAN Solution podr\u00eda permitir que un atacante remoto autenticado inyecte y ejecute comandos arbitrarios con privilegios de usuario vmanage en un sistema afectado. La vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de par\u00e1metros de datos para ciertos campos de la soluci\u00f3n afectada. Un atacante podr\u00eda explotar esta vulnerabilidad configurando un usuario malicioso en la p\u00e1gina de inicio de sesi\u00f3n de la soluci\u00f3n afectada. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante inyecte y ejecute comandos arbitrarios con privilegios de usuario vmanage en un sistema afectado. Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69974." } ], "id": "CVE-2018-0344", "lastModified": "2024-11-21T03:38:01.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.337", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104868" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104877 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104877 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003." }, { "lang": "es", "value": "Una vulnerabilidad en el servicio de configuraci\u00f3n y monitorizaci\u00f3n de Cisco SD-WAN Solution podr\u00eda permitir que un atacante local autenticado ejecute c\u00f3digo arbitrario con privilegios root o provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a comprobaciones de l\u00edmites incompletas para los datos proporcionados por el servicio de configuraci\u00f3n y monitorizaci\u00f3n de la soluci\u00f3n afectada. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de datos maliciosos al servicio en escucha de vDaemon en un dispositivo afectado. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante provoque un desbordamiento de b\u00fafer en el dispositivo afectado que le permitir\u00eda ejecutar c\u00f3digo arbitrario con privilegios root o provocar que el servicio en escucha de vDaemon se recargue y resulte en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi70003." } ], "id": "CVE-2018-0342", "lastModified": "2024-11-21T03:38:01.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.243", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104877" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104859 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104859 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937." }, { "lang": "es", "value": "Una vulnerabilidad en la base de datos de configuraci\u00f3n y gesti\u00f3n de Cisco SD-WAN Solution podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios con privilegios de usuario vmanage en el sistema de gesti\u00f3n de configuraci\u00f3n de un sistema afectado. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de argumentos de comando que se pasan a la base de datos de configuraci\u00f3n y gesti\u00f3n del software afectado. Un atacante podr\u00eda explotar esta vulnerabilidad creando funciones personalizadas que contienen c\u00f3digo malicioso y se ejecutan como el usuario vmanage del sistema de gesti\u00f3n de configuraci\u00f3n. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos arbitrarios con privilegios de usuario vmanage en el sistema de gesti\u00f3n de configuraci\u00f3n del sistema afectado. Esta vulnerabilidad afecta a los siguientes productos Cisco si ejecutan una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69937." } ], "id": "CVE-2018-0345", "lastModified": "2024-11-21T03:38:01.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.383", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104859" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104854 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104854 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856." }, { "lang": "es", "value": "Una vulnerabilidad en Cisco SD-WAN Solution podr\u00eda permitir que el atacante sobrescriba archivos arbitrarios en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a la validaci\u00f3n de entradas incorrecta del comando de petici\u00f3n admin-tech en la interfaz de l\u00ednea de comandos del software afectado. Un atacante podr\u00eda explotar esta vulnerabilidad modificando el comando de petici\u00f3n admin-tech en la interfaz de l\u00ednea de comandos de un dispositivo afectado. Si se explota esta vulnerabilidad con \u00e9xito, el atacante podr\u00eda sobrescribir archivos arbitrarios en el sistema operativo subyacente de un dispositivo afectado y escalar sus privilegios a usuario root. Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856." } ], "id": "CVE-2018-0349", "lastModified": "2024-11-21T03:38:02.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.587", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104854" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104855 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104855 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914." }, { "lang": "es", "value": "Una vulnerabilidad en el el servicio Zero Touch Provisioning de Cisco SD-WAN Solution podr\u00eda permitir que un atacante remoto sin autenticar provoque una denegaci\u00f3n de servicio (DoS) en un sistema afectado. La vulnerabilidad se debe a comprobaciones de l\u00edmites incorrectas para ciertos valores en los paquetes que se env\u00edan al servicio Zero Touch Provisioning del sistema afectado. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de paquetes maliciosos al software afectado para procesarlos. Cuando el software procesa los paquetes, podr\u00eda ocurrir una condici\u00f3n de desbordamiento de b\u00fafer y provocar que el dispositivo afectado se recargue. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante provoque una denegaci\u00f3n de servicio (DoS) temporal mientras se reinicia el dispositivo. Esta vulnerabilidad solo puede ser explotada por tr\u00e1fico destinado a un dispositivo afectado. No puede ser explotada por tr\u00e1fico que transita por un dispositivo. Esta vulnerabilidad afecta a los siguientes productos Cisco si ejecutan una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69914." } ], "id": "CVE-2018-0346", "lastModified": "2024-11-21T03:38:01.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.447", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104855" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104874 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104874 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836." }, { "lang": "es", "value": "Una vulnerabilidad en la configuraci\u00f3n del subsistema VPN de Cisco SD-WAN Solution podr\u00eda permitir que un atacante remoto autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validaci\u00f3n de entradas insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el dispositivo y enviando entradas manipuladas al par\u00e1metro afectado en una p\u00e1gina web. El atacante debe estar autenticado para acceder al par\u00e1metro afectado. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836." } ], "id": "CVE-2018-0350", "lastModified": "2024-11-21T03:38:02.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.633", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104874" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104861 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104861 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976." }, { "lang": "es", "value": "Una vulnerabilidad en el servicio de configuraci\u00f3n y gesti\u00f3n de Cisco SD-WAN Solution podr\u00eda permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario con privilegios de usuario vmanage o provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un sistema afectado. La vulnerabilidad se debe a las restricciones de acceso insuficientes en la interfaz de gesti\u00f3n HTTP de la soluci\u00f3n afectada. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una petici\u00f3n HTTP maliciosa al servicio de gesti\u00f3n afectado mediante un dispositivo autenticado. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute c\u00f3digo arbitrario con privilegios de usuario vmanage o detenga los servicios HTTP en un sistema afectado. Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69976." } ], "id": "CVE-2018-0343", "lastModified": "2024-11-21T03:38:01.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.290", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104861" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104860 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104860 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751." }, { "lang": "es", "value": "Una vulnerabilidad en la utilidad de l\u00ednea de comandos tcpdump de Cisco SD-WAN Solution podr\u00eda permitir que un atacante local autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validaci\u00f3n de entradas insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el dispositivo y enviando entradas manipuladas a la utilidad tcpdump. El atacante debe estar autenticado para acceder a la utilidad tcpdump. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69751." } ], "id": "CVE-2018-0351", "lastModified": "2024-11-21T03:38:02.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.680", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104860" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/104875 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104875 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | vbond_orchestrator | - | |
cisco | vedge-plus | - | |
cisco | vedge-pro | - | |
cisco | vmanage_network_management | - | |
cisco | vsmart_controller | - | |
cisco | vedge-100_firmware | * | |
cisco | vedge-100 | - | |
cisco | vedge_100b_firmware | * | |
cisco | vedge_100b | - | |
cisco | vedge_100m_firmware | * | |
cisco | vedge_100m | - | |
cisco | vedge_100wm_firmware | * | |
cisco | vedge_100wm | - | |
cisco | vedge-1000_firmware | * | |
cisco | vedge-1000 | - | |
cisco | vedge-2000_firmware | * | |
cisco | vedge-2000 | - | |
cisco | vedge-5000_firmware | * | |
cisco | vedge-5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de l\u00ednea de comandos de Cisco SD-WAN podr\u00eda permitir que un atacante remoto autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validaci\u00f3n de entradas insuficiente. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en el dispositivo y enviando entradas maliciosas al al comando load en el subsistema VPN. El atacante debe estar autenticado para acceder al par\u00e1metro de la interfaz de l\u00ednea de comandos afectado. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos con privilegios root. Esta vulnerabilidad afecta a los siguientes productos Cisco si est\u00e1n ejecutando una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69866." } ], "id": "CVE-2018-0348", "lastModified": "2024-11-21T03:38:01.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-18T23:29:00.527", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104875" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2018-0345
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104859 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104859", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104859" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0345", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:36.646505Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:53:18.176Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-21T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "104859", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104859" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0345", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "104859", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104859" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0345", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:53:18.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0347
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104862 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104862", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104862" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0347", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:35.325698Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:52:50.795Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-21T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "104862", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104862" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0347", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "104862", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104862" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0347", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:52:50.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0351
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104860 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj" }, { "name": "104860", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104860" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0351", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:30.842011Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:51:56.238Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-21T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj" }, { "name": "104860", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104860" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0351", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj" }, { "name": "104860", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104860" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0351", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:51:56.238Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0344
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104868 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject" }, { "name": "104868", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104868" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0344", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:38.029939Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:53:29.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-24T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject" }, { "name": "104868", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104868" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0344", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject" }, { "name": "104868", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104868" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0344", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:53:29.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0349
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104854 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo" }, { "name": "104854", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104854" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0349", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:45:32.150987Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:52:14.944Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo" }, { "name": "104854", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104854" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0349", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo" }, { "name": "104854", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104854" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0349", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:52:14.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0343
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104861 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.438Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex" }, { "name": "104861", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104861" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0343", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:39.524741Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:53:39.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-21T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex" }, { "name": "104861", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104861" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0343", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex" }, { "name": "104861", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104861" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0343", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:53:39.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0346
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104855 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos" }, { "name": "104855", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104855" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0346", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:43:29.505142Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:53:08.946Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos" }, { "name": "104855", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104855" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos" }, { "name": "104855", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104855" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0346", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:53:08.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0348
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104875 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104875", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104875" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0348", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:33.951225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:52:29.808Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-25T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "104875", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104875" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "104875", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104875" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0348", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:52:29.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0342
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104877 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104877", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104877" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0342", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:41.131224Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:53:48.050Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-25T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "104877", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104877" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "104877", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104877" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0342", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:53:48.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0350
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104874 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco SD-WAN Solution unknown |
Version: Cisco SD-WAN Solution unknown |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:21:15.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104874", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104874" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0350", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:41:32.234981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:52:06.737Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN Solution unknown", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco SD-WAN Solution unknown" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-25T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "104874", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104874" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN Solution unknown", "version": { "version_data": [ { "version_value": "Cisco SD-WAN Solution unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "104874", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104874" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0350", "datePublished": "2018-07-18T23:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-11-29T14:52:06.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201807-1005
Vulnerability from variot
A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors report this vulnerability CSCvi69808 , CSCvi69810 , CSCvi69814 , CSCvi69822 , CSCvi69827 , CSCvi69828 ,and CSCvi69836 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1005", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "1000" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "BID", "id": "104874" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "NVD", "id": "CVE-2018-0350" }, { "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0350" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104874" } ], "trust": 0.3 }, "cve": "CVE-2018-0350", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0350", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2018-14083", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-118552", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0350", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0350", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-14083", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201807-1302", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118552", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "VULHUB", "id": "VHN-118552" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "NVD", "id": "CVE-2018-0350" }, { "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors report this vulnerability CSCvi69808 , CSCvi69810 , CSCvi69814 , CSCvi69822 , CSCvi69827 , CSCvi69828 ,and CSCvi69836 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it", "sources": [ { "db": "NVD", "id": "CVE-2018-0350" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "BID", "id": "104874" }, { "db": "VULHUB", "id": "VHN-118552" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0350", "trust": 3.4 }, { "db": "BID", "id": "104874", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008577", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1302", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-14083", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118552", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "VULHUB", "id": "VHN-118552" }, { "db": "BID", "id": "104874" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "NVD", "id": "CVE-2018-0350" }, { "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "id": "VAR-201807-1005", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "VULHUB", "id": "VHN-118552" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14083" } ] }, "last_update_date": "2023-12-18T13:56:57.698000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sdwan-cmdinj", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdinj" }, { "title": "CiscoSD-WANSolution Remote Command Injection Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135531" }, { "title": "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82203" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118552" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "NVD", "id": "CVE-2018-0350" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdinj" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104874" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0350" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0350" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "VULHUB", "id": "VHN-118552" }, { "db": "BID", "id": "104874" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "NVD", "id": "CVE-2018-0350" }, { "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14083" }, { "db": "VULHUB", "id": "VHN-118552" }, { "db": "BID", "id": "104874" }, { "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "db": "NVD", "id": "CVE-2018-0350" }, { "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14083" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118552" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104874" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "date": "2018-07-18T23:29:00.633000", "db": "NVD", "id": "CVE-2018-0350" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14083" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118552" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104874" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008577" }, { "date": "2019-10-09T23:31:51.007000", "db": "NVD", "id": "CVE-2018-0350" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1302" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1302" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Vulnerable to command injection", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008577" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1302" } ], "trust": 0.6 } }
var-201807-1001
Vulnerability from variot
A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69914 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote denial-of-service vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1001", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "BID", "id": "104855" }, { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "NVD", "id": "CVE-2018-0346" }, { "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0346" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104855" } ], "trust": 0.3 }, "cve": "CVE-2018-0346", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0346", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-118548", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0346", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0346", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201807-1306", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118548", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-118548" }, { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "NVD", "id": "CVE-2018-0346" }, { "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69914. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69914 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote denial-of-service vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it", "sources": [ { "db": "NVD", "id": "CVE-2018-0346" }, { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "BID", "id": "104855" }, { "db": "VULHUB", "id": "VHN-118548" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0346", "trust": 2.8 }, { "db": "BID", "id": "104855", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2018-008408", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1306", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-118548", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118548" }, { "db": "BID", "id": "104855" }, { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "NVD", "id": "CVE-2018-0346" }, { "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "id": "VAR-201807-1001", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-118548" } ], "trust": 0.6159375733333333 }, "last_update_date": "2023-12-18T12:43:59.075000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sdwan-dos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-dos" }, { "title": "Cisco SD-WAN Solution Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82207" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118548" }, { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "NVD", "id": "CVE-2018-0346" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-dos" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104855" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0346" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0346" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-118548" }, { "db": "BID", "id": "104855" }, { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "NVD", "id": "CVE-2018-0346" }, { "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-118548" }, { "db": "BID", "id": "104855" }, { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "NVD", "id": "CVE-2018-0346" }, { "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118548" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104855" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "date": "2018-07-18T23:29:00.447000", "db": "NVD", "id": "CVE-2018-0346" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118548" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104855" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "date": "2019-10-09T23:31:50.007000", "db": "NVD", "id": "CVE-2018-0346" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1306" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1306" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008408" }, { "db": "CNNVD", "id": "CNNVD-201807-1306" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1306" } ], "trust": 0.6 } }
var-201807-1004
Vulnerability from variot
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856. Vendors have confirmed this vulnerability Bug ID CSCvi69852 and CSCvi69856 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Attackers can overwrite arbitrary files on an unsuspecting user's computer in the context of the vulnerable application
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1004", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "BID", "id": "104854" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "NVD", "id": "CVE-2018-0349" }, { "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0349" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104854" } ], "trust": 0.3 }, "cve": "CVE-2018-0349", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0349", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-14076", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-118551", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0349", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0349", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2018-14076", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201807-1303", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-118551", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-0349", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "VULHUB", "id": "VHN-118551" }, { "db": "VULMON", "id": "CVE-2018-0349" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "NVD", "id": "CVE-2018-0349" }, { "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856. Vendors have confirmed this vulnerability Bug ID CSCvi69852 and CSCvi69856 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. \nAttackers can overwrite arbitrary files on an unsuspecting user\u0027s computer in the context of the vulnerable application", "sources": [ { "db": "NVD", "id": "CVE-2018-0349" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "BID", "id": "104854" }, { "db": "VULHUB", "id": "VHN-118551" }, { "db": "VULMON", "id": "CVE-2018-0349" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0349", "trust": 3.5 }, { "db": "BID", "id": "104854", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2018-008411", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1303", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-14076", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118551", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-0349", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "VULHUB", "id": "VHN-118551" }, { "db": "VULMON", "id": "CVE-2018-0349" }, { "db": "BID", "id": "104854" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "NVD", "id": "CVE-2018-0349" }, { "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "id": "VAR-201807-1004", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "VULHUB", "id": "VHN-118551" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14076" } ] }, "last_update_date": "2023-12-18T12:18:41.413000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sdwan-fo", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-fo" }, { "title": "Patch for CiscoSD-WANSolution Remote File Overwrite Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135519" }, { "title": "Cisco SD-WAN Solution Enter the fix for the verification vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82204" }, { "title": "Cisco: Cisco SD-WAN Solution Arbitrary File Overwrite Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20180718-sdwan-fo" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "VULMON", "id": "CVE-2018-0349" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118551" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "NVD", "id": "CVE-2018-0349" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-fo" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/104854" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0349" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0349" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "VULHUB", "id": "VHN-118551" }, { "db": "VULMON", "id": "CVE-2018-0349" }, { "db": "BID", "id": "104854" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "NVD", "id": "CVE-2018-0349" }, { "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14076" }, { "db": "VULHUB", "id": "VHN-118551" }, { "db": "VULMON", "id": "CVE-2018-0349" }, { "db": "BID", "id": "104854" }, { "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "db": "NVD", "id": "CVE-2018-0349" }, { "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14076" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118551" }, { "date": "2018-07-18T00:00:00", "db": "VULMON", "id": "CVE-2018-0349" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104854" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "date": "2018-07-18T23:29:00.587000", "db": "NVD", "id": "CVE-2018-0349" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14076" }, { "date": "2020-08-31T00:00:00", "db": "VULHUB", "id": "VHN-118551" }, { "date": "2020-08-31T00:00:00", "db": "VULMON", "id": "CVE-2018-0349" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104854" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008411" }, { "date": "2020-08-31T16:02:29.837000", "db": "NVD", "id": "CVE-2018-0349" }, { "date": "2020-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1303" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1303" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008411" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1303" } ], "trust": 0.6 } }
var-201807-1000
Vulnerability from variot
A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937. Cisco SD-WAN Solution Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69937 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote code-execution vulnerability. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1000", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "BID", "id": "104859" }, { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "NVD", "id": "CVE-2018-0345" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0345" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "104859" } ], "trust": 0.3 }, "cve": "CVE-2018-0345", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0345", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-118547", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0345", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0345", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201807-1307", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118547", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-118547" }, { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "NVD", "id": "CVE-2018-0345" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937. Cisco SD-WAN Solution Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69937 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to a remote code-execution vulnerability. Smart Controller Software is a set of intelligent network control software. SD-WAN Solution is a set of network expansion solutions running in it", "sources": [ { "db": "NVD", "id": "CVE-2018-0345" }, { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "BID", "id": "104859" }, { "db": "VULHUB", "id": "VHN-118547" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0345", "trust": 2.8 }, { "db": "BID", "id": "104859", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2018-008407", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1307", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-118547", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118547" }, { "db": "BID", "id": "104859" }, { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "NVD", "id": "CVE-2018-0345" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "id": "VAR-201807-1000", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-118547" } ], "trust": 0.6159375733333333 }, "last_update_date": "2023-12-18T12:28:49.016000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sdwan-cx", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cx" }, { "title": "Cisco SD-WAN Solution Enter the fix for the verification vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82208" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118547" }, { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "NVD", "id": "CVE-2018-0345" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cx" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104859" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0345" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0345" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-118547" }, { "db": "BID", "id": "104859" }, { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "NVD", "id": "CVE-2018-0345" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-118547" }, { "db": "BID", "id": "104859" }, { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "NVD", "id": "CVE-2018-0345" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118547" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104859" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "date": "2018-07-18T23:29:00.383000", "db": "NVD", "id": "CVE-2018-0345" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-28T00:00:00", "db": "VULHUB", "id": "VHN-118547" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104859" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "date": "2020-08-28T19:15:21.990000", "db": "NVD", "id": "CVE-2018-0345" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1307" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1307" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008407" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "104859" }, { "db": "CNNVD", "id": "CNNVD-201807-1307" } ], "trust": 0.9 } }
var-201807-0998
Vulnerability from variot
A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976. Vendors have confirmed this vulnerability Bug ID CSCvi69976 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Failed exploit attempts may result in a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0998", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "NVD", "id": "CVE-2018-0343" }, { "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0343" } ] }, "cve": "CVE-2018-0343", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-0343", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2018-14075", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-118545", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0343", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0343", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-14075", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201807-1309", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118545", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "VULHUB", "id": "VHN-118545" }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "NVD", "id": "CVE-2018-0343" }, { "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69976. Vendors have confirmed this vulnerability Bug ID CSCvi69976 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Failed exploit attempts may result in a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2018-0343" }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "BID", "id": 104861 }, { "db": "VULHUB", "id": "VHN-118545" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0343", "trust": 3.1 }, { "db": "BID", "id": "104861", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008576", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-14075", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201807-1309", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118545", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "VULHUB", "id": "VHN-118545" }, { "db": "BID", "id": 104861 }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "NVD", "id": "CVE-2018-0343" }, { "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "id": "VAR-201807-0998", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "VULHUB", "id": "VHN-118545" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14075" } ] }, "last_update_date": "2023-12-18T13:33:48.194000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sd-wan-code-ex", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-code-ex" }, { "title": "Patch for CiscoSD-WANSolution Remote Code Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135527" }, { "title": "Cisco SD-WAN Solution Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82210" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118545" }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "NVD", "id": "CVE-2018-0343" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-code-ex" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104861" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0343" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0343" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "VULHUB", "id": "VHN-118545" }, { "db": "BID", "id": 104861 }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "NVD", "id": "CVE-2018-0343" }, { "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14075" }, { "db": "VULHUB", "id": "VHN-118545" }, { "db": "BID", "id": 104861 }, { "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "db": "NVD", "id": "CVE-2018-0343" }, { "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14075" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118545" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "date": "2018-07-18T23:29:00.290000", "db": "NVD", "id": "CVE-2018-0343" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14075" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118545" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008576" }, { "date": "2019-10-09T23:31:49.317000", "db": "NVD", "id": "CVE-2018-0343" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1309" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1309" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Access control vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008576" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1309" } ], "trust": 0.6 } }
var-201807-1006
Vulnerability from variot
A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69751 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1006", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "mobility services engine", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "BID", "id": "104860" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "NVD", "id": "CVE-2018-0351" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0351" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104860" } ], "trust": 0.3 }, "cve": "CVE-2018-0351", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0351", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.1, "id": "CNVD-2018-14110", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-118553", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0351", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0351", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-14110", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201807-1301", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118553", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "VULHUB", "id": "VHN-118553" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "NVD", "id": "CVE-2018-0351" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the tcpdump utility. The attacker must be authenticated to access the tcpdump utility. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69751. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69751 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2018-0351" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "BID", "id": "104860" }, { "db": "VULHUB", "id": "VHN-118553" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0351", "trust": 3.4 }, { "db": "BID", "id": "104860", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008389", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1301", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-14110", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118553", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "VULHUB", "id": "VHN-118553" }, { "db": "BID", "id": "104860" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "NVD", "id": "CVE-2018-0351" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "id": "VAR-201807-1006", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "VULHUB", "id": "VHN-118553" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14110" } ] }, "last_update_date": "2023-12-18T13:28:50.378000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sdwan-coinj", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-coinj" }, { "title": "CiscoSD-WANSolution Local Command Injection Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135529" }, { "title": "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82202" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118553" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "NVD", "id": "CVE-2018-0351" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-coinj" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104860" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0351" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0351" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "VULHUB", "id": "VHN-118553" }, { "db": "BID", "id": "104860" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "NVD", "id": "CVE-2018-0351" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14110" }, { "db": "VULHUB", "id": "VHN-118553" }, { "db": "BID", "id": "104860" }, { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "NVD", "id": "CVE-2018-0351" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14110" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118553" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104860" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "date": "2018-07-18T23:29:00.680000", "db": "NVD", "id": "CVE-2018-0351" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14110" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118553" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104860" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "date": "2019-10-09T23:31:51.223000", "db": "NVD", "id": "CVE-2018-0351" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1301" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "104860" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008389" }, { "db": "CNNVD", "id": "CNNVD-201807-1301" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1301" } ], "trust": 0.6 } }
var-201807-0999
Vulnerability from variot
A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69974 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0999", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "1000" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "BID", "id": "104868" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "NVD", "id": "CVE-2018-0344" }, { "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0344" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104868" } ], "trust": 0.3 }, "cve": "CVE-2018-0344", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-0344", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-14079", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-118546", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0344", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0344", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-14079", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201807-1308", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118546", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "VULHUB", "id": "VHN-118546" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "NVD", "id": "CVE-2018-0344" }, { "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the vManage dashboard for the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69974. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69974 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it", "sources": [ { "db": "NVD", "id": "CVE-2018-0344" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "BID", "id": "104868" }, { "db": "VULHUB", "id": "VHN-118546" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0344", "trust": 3.4 }, { "db": "BID", "id": "104868", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008406", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1308", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-14079", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118546", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "VULHUB", "id": "VHN-118546" }, { "db": "BID", "id": "104868" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "NVD", "id": "CVE-2018-0344" }, { "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "id": "VAR-201807-0999", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "VULHUB", "id": "VHN-118546" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14079" } ] }, "last_update_date": "2023-12-18T13:02:33.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sd-wan-cmd-inject", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-cmd-inject" }, { "title": "Patch for CiscoSD-WANSolution Remote Command Injection Vulnerability (CNVD-2018-14079)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135525" }, { "title": "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82209" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118546" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "NVD", "id": "CVE-2018-0344" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-cmd-inject" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104868" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0344" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0344" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "VULHUB", "id": "VHN-118546" }, { "db": "BID", "id": "104868" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "NVD", "id": "CVE-2018-0344" }, { "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14079" }, { "db": "VULHUB", "id": "VHN-118546" }, { "db": "BID", "id": "104868" }, { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "NVD", "id": "CVE-2018-0344" }, { "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14079" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118546" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104868" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "date": "2018-07-18T23:29:00.337000", "db": "NVD", "id": "CVE-2018-0344" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14079" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118546" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104868" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "date": "2019-10-09T23:31:49.553000", "db": "NVD", "id": "CVE-2018-0344" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1308" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1308" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008406" }, { "db": "CNNVD", "id": "CNNVD-201807-1308" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1308" } ], "trust": 0.6 } }
var-201807-1002
Vulnerability from variot
A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69906 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SD-WANSolution is a set of network expansion solutions running in it. A command injection vulnerability exists in the ZeroTouchProvisioning (ZTP) subsystem in versions prior to Cisco SD-WANSolution 18.3.0, which stems from a program failing to perform input validation. Cisco SD-WAN is prone to a local command-injection vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "BID", "id": "104862" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "NVD", "id": "CVE-2018-0347" }, { "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0347" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104862" } ], "trust": 0.3 }, "cve": "CVE-2018-0347", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0347", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.1, "id": "CNVD-2018-14077", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-118549", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0347", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0347", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-14077", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201807-1305", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118549", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "VULHUB", "id": "VHN-118549" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "NVD", "id": "CVE-2018-0347" }, { "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the affected parameter. The attacker must be authenticated to access the affected parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers. Cisco Bug IDs: CSCvi69906. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69906 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SD-WANSolution is a set of network expansion solutions running in it. A command injection vulnerability exists in the ZeroTouchProvisioning (ZTP) subsystem in versions prior to Cisco SD-WANSolution 18.3.0, which stems from a program failing to perform input validation. Cisco SD-WAN is prone to a local command-injection vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2018-0347" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "BID", "id": "104862" }, { "db": "VULHUB", "id": "VHN-118549" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0347", "trust": 3.4 }, { "db": "BID", "id": "104862", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008409", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1305", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-14077", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118549", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "VULHUB", "id": "VHN-118549" }, { "db": "BID", "id": "104862" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "NVD", "id": "CVE-2018-0347" }, { "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "id": "VAR-201807-1002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "VULHUB", "id": "VHN-118549" } ], "trust": 1.27445318 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14077" } ] }, "last_update_date": "2023-12-18T12:18:41.454000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sdwan-ci", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-ci" }, { "title": "Patch for CiscoSD-WANZeroTouchProvisioning Local Command Injection Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135521" }, { "title": "Cisco SD-WAN Solution Zero Touch Provisioning Subsystem command injection vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82206" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118549" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "NVD", "id": "CVE-2018-0347" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-ci" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104862" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0347" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0347" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "VULHUB", "id": "VHN-118549" }, { "db": "BID", "id": "104862" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "NVD", "id": "CVE-2018-0347" }, { "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14077" }, { "db": "VULHUB", "id": "VHN-118549" }, { "db": "BID", "id": "104862" }, { "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "db": "NVD", "id": "CVE-2018-0347" }, { "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14077" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118549" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104862" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "date": "2018-07-18T23:29:00.493000", "db": "NVD", "id": "CVE-2018-0347" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14077" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118549" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104862" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008409" }, { "date": "2019-10-09T23:31:50.257000", "db": "NVD", "id": "CVE-2018-0347" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1305" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "104862" }, { "db": "CNNVD", "id": "CNNVD-201807-1305" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008409" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1305" } ], "trust": 0.6 } }
var-201807-1003
Vulnerability from variot
A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69866 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. A CLI injection vulnerability exists in the CLI in versions prior to Cisco SD-WANSolution 18.3.0, which was caused by the program failing to perform sufficient input validation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-1003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "1000" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "BID", "id": "104875" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "NVD", "id": "CVE-2018-0348" }, { "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0348" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104875" } ], "trust": 0.3 }, "cve": "CVE-2018-0348", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0348", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-14074", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-118550", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0348", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0348", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-14074", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201807-1304", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118550", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "VULHUB", "id": "VHN-118550" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "NVD", "id": "CVE-2018-0348" }, { "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting malicious input to the load command within the VPN subsystem. The attacker must be authenticated to access the affected CLI parameter. A successful exploit could allow an attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69866. Cisco SD-WAN Solution Contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi69866 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. A CLI injection vulnerability exists in the CLI in versions prior to Cisco SD-WANSolution 18.3.0, which was caused by the program failing to perform sufficient input validation", "sources": [ { "db": "NVD", "id": "CVE-2018-0348" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "BID", "id": "104875" }, { "db": "VULHUB", "id": "VHN-118550" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0348", "trust": 3.4 }, { "db": "BID", "id": "104875", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008410", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201807-1304", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-14074", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118550", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "VULHUB", "id": "VHN-118550" }, { "db": "BID", "id": "104875" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "NVD", "id": "CVE-2018-0348" }, { "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "id": "VAR-201807-1003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "VULHUB", "id": "VHN-118550" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14074" } ] }, "last_update_date": "2023-12-18T13:24:00.323000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sdwan-cmdnjct", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdnjct" }, { "title": "Patch for CiscoSD-WANSolution Remote Command Injection Vulnerability (CNVD-2018-14074)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135517" }, { "title": "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82205" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.1 }, { "problemtype": "CWE-77", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118550" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "NVD", "id": "CVE-2018-0348" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-cmdnjct" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104875" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0348" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0348" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "VULHUB", "id": "VHN-118550" }, { "db": "BID", "id": "104875" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "NVD", "id": "CVE-2018-0348" }, { "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14074" }, { "db": "VULHUB", "id": "VHN-118550" }, { "db": "BID", "id": "104875" }, { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "NVD", "id": "CVE-2018-0348" }, { "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14074" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118550" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104875" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "date": "2018-07-18T23:29:00.527000", "db": "NVD", "id": "CVE-2018-0348" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14074" }, { "date": "2020-08-31T00:00:00", "db": "VULHUB", "id": "VHN-118550" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104875" }, { "date": "2018-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "date": "2020-08-31T16:01:54.273000", "db": "NVD", "id": "CVE-2018-0348" }, { "date": "2020-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1304" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1304" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008410" }, { "db": "CNNVD", "id": "CNNVD-201807-1304" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1304" } ], "trust": 0.6 } }
var-201807-0997
Vulnerability from variot
A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi70003 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN Solution is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0997", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "1000" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vsmart controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0342" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104877" } ], "trust": 0.3 }, "cve": "CVE-2018-0342", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0342", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.1, "id": "CNVD-2018-14082", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-118544", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0342", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0342", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-14082", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201807-1310", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-118544", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi70003 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN Solution is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer", "sources": [ { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "BID", "id": "104877" }, { "db": "VULHUB", "id": "VHN-118544" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0342", "trust": 3.4 }, { "db": "BID", "id": "104877", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008575", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-14082", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201807-1310", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118544", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "id": "VAR-201807-0997", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" } ] }, "last_update_date": "2023-12-18T13:52:35.159000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sd-wan-bo", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-bo" }, { "title": "Patch for CiscoSD-WANSolution Local Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135535" }, { "title": "Cisco SD-WAN Solution Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82211" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118544" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-bo" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104877" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0342" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0342" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14082" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118544" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104877" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "date": "2018-07-18T23:29:00.243000", "db": "NVD", "id": "CVE-2018-0342" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14082" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118544" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104877" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "date": "2019-10-09T23:31:49.053000", "db": "NVD", "id": "CVE-2018-0342" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "104877" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1310" } ], "trust": 0.6 } }