ID

VAR-201805-0516


CVE

CVE-2018-0279


TITLE

Cisco Enterprise NFV Infrastructure Input validation vulnerability in software

Trust: 0.8

sources: JVNDB: JVNDB-2018-005121

DESCRIPTION

A vulnerability in the Secure Copy Protocol (SCP) server of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to access the shell of the underlying Linux operating system on the affected device. The vulnerability is due to improper input validation of command arguments. An attacker could exploit this vulnerability by using crafted arguments when opening a connection to the affected device. An exploit could allow the attacker to gain shell access with a non-root user account to the underlying Linux operating system on the affected device. Due to the system design, access to the Linux shell could allow execution of additional attacks that may have a significant impact on the affected system. This vulnerability affects Cisco devices that are running release 3.7.1, 3.6.3, or earlier releases of Cisco Enterprise NFV Infrastructure Software (NFVIS) when access to the SCP server is allowed on the affected device. Cisco NFVIS Releases 3.5.x and 3.6.x do allow access to the SCP server by default, while Cisco NFVIS Release 3.7.1 does not. Cisco Bug IDs: CSCvh25026. Vendors report this vulnerability Bug ID CSCvh25026 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Successful exploits may allow an attacker to bypass certain security restrictions. This may allow the attacker to masquerade as a legitimate user, aiding in further attacks. The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller. Secure Copy Protocol (SCP) server is one of the file replication servers

Trust: 2.07

sources: NVD: CVE-2018-0279 // JVNDB: JVNDB-2018-005121 // BID: 104243 // VULHUB: VHN-118481 // VULMON: CVE-2018-0279

AFFECTED PRODUCTS

vendor:ciscomodel:enterprise nfv infrastructure softwarescope:eqversion:3.7.1

Trust: 2.7

vendor:ciscomodel:enterprise nfv infrastructure softwarescope:ltversion:3.6.3

Trust: 1.0

vendor:ciscomodel:enterprise nfv infrastructure softwarescope:lteversion:3.6.3

Trust: 0.8

vendor:ciscomodel:enterprise nfv infrastructure softwarescope:eqversion:3.6.3

Trust: 0.3

vendor:ciscomodel:enterprise nfv infrastructure softwarescope:neversion:3.8.1

Trust: 0.3

sources: BID: 104243 // JVNDB: JVNDB-2018-005121 // CNNVD: CNNVD-201805-629 // NVD: CVE-2018-0279

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0279
value: HIGH

Trust: 1.0

NVD: CVE-2018-0279
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201805-629
value: HIGH

Trust: 0.6

VULHUB: VHN-118481
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0279
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0279
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2018-0279
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-118481
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0279
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-0279
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-118481 // VULMON: CVE-2018-0279 // JVNDB: JVNDB-2018-005121 // CNNVD: CNNVD-201805-629 // NVD: CVE-2018-0279

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-78

Trust: 1.1

sources: VULHUB: VHN-118481 // JVNDB: JVNDB-2018-005121 // NVD: CVE-2018-0279

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201805-629

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201805-629

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-005121

PATCH

title:cisco-sa-20180516-nfvisurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis

Trust: 0.8

title:Cisco: Cisco Enterprise NFV Infrastructure Software Linux Shell Access Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180516-nfvis

Trust: 0.1

title:doraurl:https://github.com/s-index/dora

Trust: 0.1

title:Threatposturl:https://threatpost.com/cisco-warns-of-three-critical-bugs-in-digital-network-architecture-platform/132057/

Trust: 0.1

sources: VULMON: CVE-2018-0279 // JVNDB: JVNDB-2018-005121

EXTERNAL IDS

db:NVDid:CVE-2018-0279

Trust: 2.9

db:BIDid:104243

Trust: 2.1

db:JVNDBid:JVNDB-2018-005121

Trust: 0.8

db:CNNVDid:CNNVD-201805-629

Trust: 0.6

db:VULHUBid:VHN-118481

Trust: 0.1

db:VULMONid:CVE-2018-0279

Trust: 0.1

sources: VULHUB: VHN-118481 // VULMON: CVE-2018-0279 // BID: 104243 // JVNDB: JVNDB-2018-005121 // CNNVD: CNNVD-201805-629 // NVD: CVE-2018-0279

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180516-nfvis

Trust: 2.2

url:http://www.securityfocus.com/bid/104243

Trust: 1.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0279

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0279

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-warns-of-three-critical-bugs-in-digital-network-architecture-platform/132057/

Trust: 0.1

sources: VULHUB: VHN-118481 // VULMON: CVE-2018-0279 // BID: 104243 // JVNDB: JVNDB-2018-005121 // CNNVD: CNNVD-201805-629 // NVD: CVE-2018-0279

CREDITS

Cisco

Trust: 0.3

sources: BID: 104243

SOURCES

db:VULHUBid:VHN-118481
db:VULMONid:CVE-2018-0279
db:BIDid:104243
db:JVNDBid:JVNDB-2018-005121
db:CNNVDid:CNNVD-201805-629
db:NVDid:CVE-2018-0279

LAST UPDATE DATE

2024-11-23T22:00:31.110000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118481date:2020-09-04T00:00:00
db:VULMONid:CVE-2018-0279date:2020-09-04T00:00:00
db:BIDid:104243date:2018-05-16T00:00:00
db:JVNDBid:JVNDB-2018-005121date:2018-07-06T00:00:00
db:CNNVDid:CNNVD-201805-629date:2020-09-07T00:00:00
db:NVDid:CVE-2018-0279date:2024-11-21T03:37:52.987

SOURCES RELEASE DATE

db:VULHUBid:VHN-118481date:2018-05-17T00:00:00
db:VULMONid:CVE-2018-0279date:2018-05-17T00:00:00
db:BIDid:104243date:2018-05-16T00:00:00
db:JVNDBid:JVNDB-2018-005121date:2018-07-06T00:00:00
db:CNNVDid:CNNVD-201805-629date:2018-05-18T00:00:00
db:NVDid:CVE-2018-0279date:2018-05-17T03:29:00.467