ID

VAR-201803-2075


CVE

CVE-2018-5313


TITLE

Rapid SCADA Permissions vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-002716

DESCRIPTION

A vulnerability allows local attackers to escalate privilege on Rapid Scada 5.5.0 because of weak C:\SCADA permissions. The specific flaw exists within the access control that is set and modified during the installation of the product. The product sets weak access control restrictions. An attacker can leverage this vulnerability to execute arbitrary code under the context of Administrator, the IUSR account, or SYSTEM. Rapid SCADA Contains a permission vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rapid Scada is a free open source SCADA software. The software supports the creation of systems such as industrial automation, home automation, and energy accounting

Trust: 2.34

sources: NVD: CVE-2018-5313 // JVNDB: JVNDB-2018-002716 // CNVD: CNVD-2018-06526 // IVD: e2ea084f-39ab-11e9-8437-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2ea084f-39ab-11e9-8437-000c29342cb1 // CNVD: CNVD-2018-06526

AFFECTED PRODUCTS

vendor:rapidscadamodel:rapid scadascope:eqversion:5.5.0

Trust: 1.6

vendor:rapid scadamodel:rapid scadascope:eqversion:5.5.0

Trust: 0.8

vendor:rapidmodel:scadascope:eqversion:5.5.0

Trust: 0.6

vendor:rapid scadamodel: - scope:eqversion:5.5.0

Trust: 0.2

sources: IVD: e2ea084f-39ab-11e9-8437-000c29342cb1 // CNVD: CNVD-2018-06526 // JVNDB: JVNDB-2018-002716 // CNNVD: CNNVD-201803-215 // NVD: CVE-2018-5313

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5313
value: HIGH

Trust: 1.0

NVD: CVE-2018-5313
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-06526
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201803-215
value: HIGH

Trust: 0.6

IVD: e2ea084f-39ab-11e9-8437-000c29342cb1
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2018-5313
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-06526
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2ea084f-39ab-11e9-8437-000c29342cb1
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2018-5313
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2ea084f-39ab-11e9-8437-000c29342cb1 // CNVD: CNVD-2018-06526 // JVNDB: JVNDB-2018-002716 // CNNVD: CNNVD-201803-215 // NVD: CVE-2018-5313

PROBLEMTYPE DATA

problemtype:CWE-732

Trust: 1.0

problemtype:CWE-275

Trust: 0.8

sources: JVNDB: JVNDB-2018-002716 // NVD: CVE-2018-5313

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201803-215

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201803-215

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-002716

PATCH

title:Top Pageurl:https://rapidscada.org/

Trust: 0.8

sources: JVNDB: JVNDB-2018-002716

EXTERNAL IDS

db:NVDid:CVE-2018-5313

Trust: 3.2

db:PACKETSTORMid:146668

Trust: 3.0

db:CNVDid:CNVD-2018-06526

Trust: 0.8

db:CNNVDid:CNNVD-201803-215

Trust: 0.8

db:JVNDBid:JVNDB-2018-002716

Trust: 0.8

db:IVDid:E2EA084F-39AB-11E9-8437-000C29342CB1

Trust: 0.2

sources: IVD: e2ea084f-39ab-11e9-8437-000c29342cb1 // CNVD: CNVD-2018-06526 // JVNDB: JVNDB-2018-002716 // CNNVD: CNNVD-201803-215 // NVD: CVE-2018-5313

REFERENCES

url:http://packetstormsecurity.com/files/146668/rapid-scada-5.5.0-insecure-permissions.html

Trust: 3.0

url:http://seclists.org/fulldisclosure/2018/mar/11

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5313

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5313

Trust: 0.8

sources: CNVD: CNVD-2018-06526 // JVNDB: JVNDB-2018-002716 // CNNVD: CNNVD-201803-215 // NVD: CVE-2018-5313

SOURCES

db:IVDid:e2ea084f-39ab-11e9-8437-000c29342cb1
db:CNVDid:CNVD-2018-06526
db:JVNDBid:JVNDB-2018-002716
db:CNNVDid:CNNVD-201803-215
db:NVDid:CVE-2018-5313

LAST UPDATE DATE

2024-11-23T22:55:55.201000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-06526date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-002716date:2018-04-25T00:00:00
db:CNNVDid:CNNVD-201803-215date:2020-10-23T00:00:00
db:NVDid:CVE-2018-5313date:2024-11-21T04:08:34.290

SOURCES RELEASE DATE

db:IVDid:e2ea084f-39ab-11e9-8437-000c29342cb1date:2018-03-28T00:00:00
db:CNVDid:CNVD-2018-06526date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-002716date:2018-04-25T00:00:00
db:CNNVDid:CNNVD-201803-215date:2018-03-09T00:00:00
db:NVDid:CVE-2018-5313date:2018-03-08T20:29:00.377