ID

VAR-201803-1370


CVE

CVE-2018-0150


TITLE

Cisco IOS XE Vulnerability in the use of hard-coded credentials in software

Trust: 0.8

sources: JVNDB: JVNDB-2018-003422

DESCRIPTION

A vulnerability in Cisco IOS XE Software could allow an unauthenticated, remote attacker to log in to a device running an affected release of Cisco IOS XE Software with the default username and password that are used at initial boot, aka a Static Credential Vulnerability. The vulnerability is due to an undocumented user account with privilege level 15 that has a default username and password. An attacker could exploit this vulnerability by using this account to remotely connect to an affected device. A successful exploit could allow the attacker to log in to the device with privilege level 15 access. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS XE Software Release 16.x. This vulnerability does not affect Cisco IOS XE Software releases prior to Release 16.x. Cisco Bug IDs: CSCve89880. Vendors have confirmed this vulnerability Bug ID CSCve89880 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This may lead to further attacks

Trust: 2.07

sources: NVD: CVE-2018-0150 // JVNDB: JVNDB-2018-003422 // BID: 103539 // VULHUB: VHN-118352 // VULMON: CVE-2018-0150

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:16.5.1

Trust: 1.6

vendor:ciscomodel:ios xescope:ltversion:16.x

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:everest-16.5.1

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:series integrated services router everest-16.5.1scope:eqversion:4400

Trust: 0.3

vendor:ciscomodel:series integrated services routerscope:eqversion:440016.5.1

Trust: 0.3

sources: BID: 103539 // JVNDB: JVNDB-2018-003422 // CNNVD: CNNVD-201803-1039 // NVD: CVE-2018-0150

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0150
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-0150
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201803-1039
value: CRITICAL

Trust: 0.6

VULHUB: VHN-118352
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0150
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0150
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-118352
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0150
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-0150
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-118352 // VULMON: CVE-2018-0150 // JVNDB: JVNDB-2018-003422 // CNNVD: CNNVD-201803-1039 // NVD: CVE-2018-0150

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-118352 // JVNDB: JVNDB-2018-003422 // NVD: CVE-2018-0150

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-1039

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201803-1039

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003422

PATCH

title:cisco-sa-20180328-xescurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc

Trust: 0.8

title:Cisco IOS XE Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79507

Trust: 0.6

title:Cisco: Cisco IOS XE Software Static Credential Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180328-xesc

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2018/03/29/cisco_critical_ios_bugs/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/cisco-removes-backdoor-account-from-ios-xe-software/

Trust: 0.1

title:Threatposturl:https://threatpost.com/cisco-patches-two-critical-rce-bugs-in-ios-xe-software/130852/

Trust: 0.1

sources: VULMON: CVE-2018-0150 // JVNDB: JVNDB-2018-003422 // CNNVD: CNNVD-201803-1039

EXTERNAL IDS

db:NVDid:CVE-2018-0150

Trust: 2.9

db:BIDid:103539

Trust: 2.1

db:SECTRACKid:1040579

Trust: 1.8

db:JVNDBid:JVNDB-2018-003422

Trust: 0.8

db:CNNVDid:CNNVD-201803-1039

Trust: 0.7

db:VULHUBid:VHN-118352

Trust: 0.1

db:VULMONid:CVE-2018-0150

Trust: 0.1

sources: VULHUB: VHN-118352 // VULMON: CVE-2018-0150 // BID: 103539 // JVNDB: JVNDB-2018-003422 // CNNVD: CNNVD-201803-1039 // NVD: CVE-2018-0150

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-xesc

Trust: 2.2

url:http://www.securityfocus.com/bid/103539

Trust: 1.9

url:http://www.securitytracker.com/id/1040579

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0150

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0150

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-patches-two-critical-rce-bugs-in-ios-xe-software/130852/

Trust: 0.1

sources: VULHUB: VHN-118352 // VULMON: CVE-2018-0150 // BID: 103539 // JVNDB: JVNDB-2018-003422 // CNNVD: CNNVD-201803-1039 // NVD: CVE-2018-0150

CREDITS

Cisco

Trust: 0.3

sources: BID: 103539

SOURCES

db:VULHUBid:VHN-118352
db:VULMONid:CVE-2018-0150
db:BIDid:103539
db:JVNDBid:JVNDB-2018-003422
db:CNNVDid:CNNVD-201803-1039
db:NVDid:CVE-2018-0150

LAST UPDATE DATE

2024-11-23T22:22:11.831000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118352date:2019-12-02T00:00:00
db:VULMONid:CVE-2018-0150date:2019-12-02T00:00:00
db:BIDid:103539date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-003422date:2018-05-23T00:00:00
db:CNNVDid:CNNVD-201803-1039date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0150date:2024-11-21T03:37:36.930

SOURCES RELEASE DATE

db:VULHUBid:VHN-118352date:2018-03-28T00:00:00
db:VULMONid:CVE-2018-0150date:2018-03-28T00:00:00
db:BIDid:103539date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-003422date:2018-05-23T00:00:00
db:CNNVDid:CNNVD-201803-1039date:2018-03-29T00:00:00
db:NVDid:CVE-2018-0150date:2018-03-28T22:29:00.217