var-201807-0997
Vulnerability from variot
A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi70003 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN Solution is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0997", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vedge-plus", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge-1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100b", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100wm", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge-100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100m", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "1000" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100b", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100m", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100wm", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-plus", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge-pro", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2000" }, { "model": "vedge series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "100" }, { "model": "vsmart controller software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0342" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "104877" } ], "trust": 0.3 }, "cve": "CVE-2018-0342", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0342", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.1, "id": "CNVD-2018-14082", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-118544", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0342", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0342", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-14082", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201807-1310", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-118544", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the configuration and monitoring service of the Cisco SD-WAN Solution could allow an authenticated, local attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete bounds checks for data that is provided by the configuration and monitoring service of the affected solution. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, which could allow the attacker to execute arbitrary code with root privileges on the device or cause the vDaemon listening service to reload and result in a DoS condition on the device. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi70003. Cisco SD-WAN Solution Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvi70003 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN Solution is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer", "sources": [ { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "BID", "id": "104877" }, { "db": "VULHUB", "id": "VHN-118544" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0342", "trust": 3.4 }, { "db": "BID", "id": "104877", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-008575", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-14082", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201807-1310", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118544", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "id": "VAR-201807-0997", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" } ], "trust": 1.290597024 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" } ] }, "last_update_date": "2023-12-18T13:52:35.159000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180718-sd-wan-bo", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-bo" }, { "title": "Patch for CiscoSD-WANSolution Local Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/135535" }, { "title": "Cisco SD-WAN Solution Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82211" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118544" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sd-wan-bo" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104877" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0342" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0342" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-14082" }, { "db": "VULHUB", "id": "VHN-118544" }, { "db": "BID", "id": "104877" }, { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "NVD", "id": "CVE-2018-0342" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14082" }, { "date": "2018-07-18T00:00:00", "db": "VULHUB", "id": "VHN-118544" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104877" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "date": "2018-07-18T23:29:00.243000", "db": "NVD", "id": "CVE-2018-0342" }, { "date": "2018-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-14082" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118544" }, { "date": "2018-07-18T00:00:00", "db": "BID", "id": "104877" }, { "date": "2018-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "date": "2019-10-09T23:31:49.053000", "db": "NVD", "id": "CVE-2018-0342" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201807-1310" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "104877" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-008575" }, { "db": "CNNVD", "id": "CNNVD-201807-1310" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201807-1310" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.