CNVD-2018-14110
Vulnerability from cnvd - Published: 2018-07-27
VLAI Severity ?
Title
Cisco SD-WAN Solution本地命令注入漏洞
Description
Cisco vBond Orchestrator Software等都是美国思科(Cisco)公司的产品。Cisco vBond Orchestrator Software是一套安全网络扩展管理软件。vEdge 100 Series Routers是一款100系列的路由器产品。SD-WAN Solution是运行在其中的一套网络扩展解决方案。
Cisco SD-WAN Solution 18.3.0之前版本中的命令行tcpdump utility存在命令注入漏洞,该漏洞源于程序未能充分的执行输入验证。本地攻击者可通过对设备进行身份验证并提交特制的输入利用该漏洞以root权限执行命令。
Severity
中
Patch Name
Cisco SD-WAN Solution本地命令注入漏洞的补丁
Patch Description
Cisco vBond Orchestrator Software等都是美国思科(Cisco)公司的产品。Cisco vBond Orchestrator Software是一套安全网络扩展管理软件。vEdge 100 Series Routers是一款100系列的路由器产品。SD-WAN Solution是运行在其中的一套网络扩展解决方案。
Cisco SD-WAN Solution 18.3.0之前版本中的命令行tcpdump utility存在命令注入漏洞,该漏洞源于程序未能充分的执行输入验证。本地攻击者可通过对设备进行身份验证并提交特制的输入利用该漏洞以root权限执行命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj
Reference
https://nvd.nist.gov/vuln/detail/CVE-2018-0351
Impacted products
| Name | ['Cisco vBond Orchestrator Software', 'Cisco vManage Network Management Software', 'Cisco vSmart Controller Software', 'Cisco vEdge Cloud Router Platform', 'Cisco vEdge 5000 Series Routers', 'Cisco vEdge 2000 Series Routers', 'Cisco vEdge 1000 Series Routers', 'Cisco vEdge 100 Series Routers'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "104860"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-0351",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0351"
}
},
"description": "Cisco vBond Orchestrator Software\u7b49\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco vBond Orchestrator Software\u662f\u4e00\u5957\u5b89\u5168\u7f51\u7edc\u6269\u5c55\u7ba1\u7406\u8f6f\u4ef6\u3002vEdge 100 Series Routers\u662f\u4e00\u6b3e100\u7cfb\u5217\u7684\u8def\u7531\u5668\u4ea7\u54c1\u3002SD-WAN Solution\u662f\u8fd0\u884c\u5728\u5176\u4e2d\u7684\u4e00\u5957\u7f51\u7edc\u6269\u5c55\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nCisco SD-WAN Solution 18.3.0\u4e4b\u524d\u7248\u672c\u4e2d\u7684\u547d\u4ee4\u884ctcpdump utility\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u7684\u6267\u884c\u8f93\u5165\u9a8c\u8bc1\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5bf9\u8bbe\u5907\u8fdb\u884c\u8eab\u4efd\u9a8c\u8bc1\u5e76\u63d0\u4ea4\u7279\u5236\u7684\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5root\u6743\u9650\u6267\u884c\u547d\u4ee4\u3002",
"discovererName": "Cisco",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-14110",
"openTime": "2018-07-27",
"patchDescription": "Cisco vBond Orchestrator Software\u7b49\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco vBond Orchestrator Software\u662f\u4e00\u5957\u5b89\u5168\u7f51\u7edc\u6269\u5c55\u7ba1\u7406\u8f6f\u4ef6\u3002vEdge 100 Series Routers\u662f\u4e00\u6b3e100\u7cfb\u5217\u7684\u8def\u7531\u5668\u4ea7\u54c1\u3002SD-WAN Solution\u662f\u8fd0\u884c\u5728\u5176\u4e2d\u7684\u4e00\u5957\u7f51\u7edc\u6269\u5c55\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nCisco SD-WAN Solution 18.3.0\u4e4b\u524d\u7248\u672c\u4e2d\u7684\u547d\u4ee4\u884ctcpdump utility\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u7684\u6267\u884c\u8f93\u5165\u9a8c\u8bc1\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5bf9\u8bbe\u5907\u8fdb\u884c\u8eab\u4efd\u9a8c\u8bc1\u5e76\u63d0\u4ea4\u7279\u5236\u7684\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5root\u6743\u9650\u6267\u884c\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco SD-WAN Solution\u672c\u5730\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco vBond Orchestrator Software",
"Cisco vManage Network Management Software",
"Cisco vSmart Controller Software",
"Cisco vEdge Cloud Router Platform",
"Cisco vEdge 5000 Series Routers",
"Cisco vEdge 2000 Series Routers",
"Cisco vEdge 1000 Series Routers",
"Cisco vEdge 100 Series Routers"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-0351",
"serverity": "\u4e2d",
"submitTime": "2018-07-26",
"title": "Cisco SD-WAN Solution\u672c\u5730\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…