var-201810-0308
Vulnerability from variot
A vulnerability in the command-line interface (CLI) in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges. Cisco SD-WAN Solution Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco vEdge 100 Series Routers is a 100 Series router product. vManageNetworkManagementSystem is a network management system. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability. This issue being tracked by Cisco Bug IDs CSCvi69802 and CSCvi69903
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0308", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vsmart controller", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vbond orchestrator", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vmanage network management system", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 100", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 1000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 2000", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "vbond orchestrator", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 2000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge 5000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vedge cloud router platform", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vmanage network management", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "sd-wan solution", "scope": "lt", "trust": 0.6, "vendor": "cisco", "version": "18.3.0" }, { "model": "vedge 5000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "16.9.3" }, { "model": "vedge 1000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vedge 1000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "16.9.1" }, { "model": "vedge 1000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "16.9" }, { "model": "vedge 2000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "vsmart controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vmanage network management", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge cloud router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20000" }, { "model": "vedge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "vbond orchestrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sd-wan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "BID", "id": "105295" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "NVD", "id": "CVE-2018-0433" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "18.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vedge_cloud_router_platform:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:vmanage_network_management_system:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0433" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "105295" } ], "trust": 0.3 }, "cve": "CVE-2018-0433", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2018-0433", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2018-18790", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-118635", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-0433", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0433", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-18790", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201809-260", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118635", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "VULHUB", "id": "VHN-118635" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "NVD", "id": "CVE-2018-0433" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the command-line interface (CLI) in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges. Cisco SD-WAN Solution Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco vEdge 100 Series Routers is a 100 Series router product. vManageNetworkManagementSystem is a network management system. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability. \nThis issue being tracked by Cisco Bug IDs CSCvi69802 and CSCvi69903", "sources": [ { "db": "NVD", "id": "CVE-2018-0433" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "BID", "id": "105295" }, { "db": "VULHUB", "id": "VHN-118635" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0433", "trust": 3.4 }, { "db": "BID", "id": "105295", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2018-013278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-260", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-18790", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118635", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "VULHUB", "id": "VHN-118635" }, { "db": "BID", "id": "105295" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "NVD", "id": "CVE-2018-0433" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "id": "VAR-201810-0308", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "VULHUB", "id": "VHN-118635" } ], "trust": 1.3155970240000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" } ] }, "last_update_date": "2023-12-18T13:18:58.240000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180905-sd-wan-injection", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180905-sd-wan-injection" }, { "title": "CiscoSD-WANSolution Command to Inject Vulnerability Patches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/140275" }, { "title": "Cisco SD-WAN Solution Fixes for command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=84591" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.1 }, { "problemtype": "CWE-77", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118635" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "NVD", "id": "CVE-2018-0433" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180905-sd-wan-injection" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/105295" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0433" }, { "trust": 0.6, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0433" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "VULHUB", "id": "VHN-118635" }, { "db": "BID", "id": "105295" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "NVD", "id": "CVE-2018-0433" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "VULHUB", "id": "VHN-118635" }, { "db": "BID", "id": "105295" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "NVD", "id": "CVE-2018-0433" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-18790" }, { "date": "2018-10-05T00:00:00", "db": "VULHUB", "id": "VHN-118635" }, { "date": "2018-09-05T00:00:00", "db": "BID", "id": "105295" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "date": "2018-10-05T14:29:01.607000", "db": "NVD", "id": "CVE-2018-0433" }, { "date": "2018-09-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-18790" }, { "date": "2020-08-28T00:00:00", "db": "VULHUB", "id": "VHN-118635" }, { "date": "2018-09-05T00:00:00", "db": "BID", "id": "105295" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "date": "2020-08-28T18:46:36.733000", "db": "NVD", "id": "CVE-2018-0433" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-260" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "105295" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco SD-WAN Solution Command Injection Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2018-18790" }, { "db": "JVNDB", "id": "JVNDB-2018-013278" }, { "db": "CNNVD", "id": "CNNVD-201809-260" } ], "trust": 2.0 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-260" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.