ID

VAR-201805-0916


CVE

CVE-2018-3649


TITLE

plural Intel Wireless-AC Product injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-005089

DESCRIPTION

DLL injection vulnerability in the installation executables (Autorun.exe and Setup.exe) for Intel's wireless drivers and related software in Intel Dual Band Wireless-AC, Tri-Band Wireless-AC and Wireless-AC family of products allows a local attacker to cause escalation of privilege via remote code execution. plural Intel Wireless-AC The product contains an injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IntelDualBandWireless-AC, Tri-BandWireless-AC and Wireless-AC are all wireless network card products of Intel Corporation of the United States. Intelwirelessdrivers is one of the wireless network card drivers. Autorun.exe is one of the executable files; Setup.exe is one of the installation files. There are security vulnerabilities in the Autorun.exe and Setup.exe files for the Intelwireless drivers and related software in IntelDualBandWireless-AC, Tri-BandWireless-AC and Wireless-AC. A local attacker can exploit this vulnerability to increase privileges through remote code execution

Trust: 2.16

sources: NVD: CVE-2018-3649 // JVNDB: JVNDB-2018-005089 // CNVD: CNVD-2018-13772

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-13772

AFFECTED PRODUCTS

vendor:intelmodel:dual band wireless-ac 8260scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:wireless-ac 9461scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-ac 3160scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-n 7265scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-ac 3168scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:wireless-ac 9462scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-ac 7260scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:wireless-n 7260scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:wireless-n 7265scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:tri-band wireless-ac 18260scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:tri-band wireless-ac 18265scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-n 7260scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:tri-band wireless-ac 17265scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:wireless-ac 9560scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-ac 7265scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-ac 8265scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-ac 3165scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:wireless-ac 9260scope:ltversion:20.20.2.2

Trust: 1.0

vendor:intelmodel:dual band wireless-ac 3160scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-ac 3165scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-ac 3168scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-ac 7260scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-ac 7265scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-ac 8260scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-ac 8265scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-n 7260scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-n 7265scope: - version: -

Trust: 0.8

vendor:intelmodel:tri-band wireless-ac 17265scope: - version: -

Trust: 0.8

vendor:intelmodel:tri-band wireless-ac 18260scope: - version: -

Trust: 0.8

vendor:intelmodel:tri-band wireless-ac 18265scope: - version: -

Trust: 0.8

vendor:intelmodel:wireless-ac 9260scope: - version: -

Trust: 0.8

vendor:intelmodel:wireless-ac 9461scope: - version: -

Trust: 0.8

vendor:intelmodel:wireless-ac 9462scope: - version: -

Trust: 0.8

vendor:intelmodel:wireless-ac 9560scope: - version: -

Trust: 0.8

vendor:intelmodel:wireless-n 7260scope: - version: -

Trust: 0.8

vendor:intelmodel:wireless-n 7265scope: - version: -

Trust: 0.8

vendor:intelmodel:dual band wireless-acscope: - version: -

Trust: 0.6

vendor:intelmodel:tri-band wireless-acscope: - version: -

Trust: 0.6

vendor:intelmodel:wireless-ac familyscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2018-13772 // JVNDB: JVNDB-2018-005089 // NVD: CVE-2018-3649

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-3649
value: HIGH

Trust: 1.0

NVD: CVE-2018-3649
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-13772
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201805-326
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2018-3649
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-13772
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-3649
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-13772 // JVNDB: JVNDB-2018-005089 // CNNVD: CNNVD-201805-326 // NVD: CVE-2018-3649

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.0

problemtype:CWE-74

Trust: 0.8

sources: JVNDB: JVNDB-2018-005089 // NVD: CVE-2018-3649

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201805-326

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201805-326

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-005089

PATCH

title:INTEL-SA-00126url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00126.html

Trust: 0.8

title:Patch for IntelDualBandWireless-AC, Tri-BandWireless-AC and Wireless-ACIntelwireless drivers and related software DLL injection vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/135181

Trust: 0.6

title:Intel Dual Band Wireless-AC , Tri-Band Wireless-AC and Wireless-AC Intel wireless Fixes for drivers and related software security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79997

Trust: 0.6

sources: CNVD: CNVD-2018-13772 // JVNDB: JVNDB-2018-005089 // CNNVD: CNNVD-201805-326

EXTERNAL IDS

db:NVDid:CVE-2018-3649

Trust: 3.0

db:JVNDBid:JVNDB-2018-005089

Trust: 0.8

db:CNVDid:CNVD-2018-13772

Trust: 0.6

db:CNNVDid:CNNVD-201805-326

Trust: 0.6

sources: CNVD: CNVD-2018-13772 // JVNDB: JVNDB-2018-005089 // CNNVD: CNNVD-201805-326 // NVD: CVE-2018-3649

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00126.html

Trust: 2.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3649

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3649

Trust: 0.8

sources: CNVD: CNVD-2018-13772 // JVNDB: JVNDB-2018-005089 // CNNVD: CNNVD-201805-326 // NVD: CVE-2018-3649

SOURCES

db:CNVDid:CNVD-2018-13772
db:JVNDBid:JVNDB-2018-005089
db:CNNVDid:CNNVD-201805-326
db:NVDid:CVE-2018-3649

LAST UPDATE DATE

2024-11-23T21:53:08.460000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-13772date:2018-07-24T00:00:00
db:JVNDBid:JVNDB-2018-005089date:2018-07-05T00:00:00
db:CNNVDid:CNNVD-201805-326date:2020-10-22T00:00:00
db:NVDid:CVE-2018-3649date:2024-11-21T04:05:50.287

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-13772date:2018-07-24T00:00:00
db:JVNDBid:JVNDB-2018-005089date:2018-07-05T00:00:00
db:CNNVDid:CNNVD-201805-326date:2018-05-11T00:00:00
db:NVDid:CVE-2018-3649date:2018-05-10T22:29:00.400