ID

VAR-201807-1004


CVE

CVE-2018-0349


TITLE

Cisco SD-WAN Solution Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-008411

DESCRIPTION

A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69852, CSCvi69856. Vendors have confirmed this vulnerability Bug ID CSCvi69852 and CSCvi69856 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscovBondOrchestratorSoftware and others are products of Cisco. CiscovBondOrchestratorSoftware is a set of secure network extension management software. The vEdge100SeriesRouters is a 100 Series router product. SD-WANSolution is a set of network expansion solutions running in it. Attackers can overwrite arbitrary files on an unsuspecting user's computer in the context of the vulnerable application

Trust: 2.61

sources: NVD: CVE-2018-0349 // JVNDB: JVNDB-2018-008411 // CNVD: CNVD-2018-14076 // BID: 104854 // VULHUB: VHN-118551 // VULMON: CVE-2018-0349

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-14076

AFFECTED PRODUCTS

vendor:ciscomodel:vedge-proscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vsmart controllerscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vbond orchestratorscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vmanage network managementscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vedge-plusscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vedge-1000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge-2000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge-5000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge-100scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 100wmscope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 100bscope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 100mscope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vbond orchestratorscope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 100scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 1000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 100bscope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 100mscope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 100wmscope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 2000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 5000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge-plusscope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge-proscope: - version: -

Trust: 0.8

vendor:ciscomodel:vmanage network managementscope: - version: -

Trust: 0.8

vendor:ciscomodel:vsmart controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:vbond orchestrator softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:vmanage network management softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:vsmart controller softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:vedge cloud router platformscope: - version: -

Trust: 0.6

vendor:ciscomodel:vedge series routersscope:eqversion:5000

Trust: 0.6

vendor:ciscomodel:vedge series routersscope:eqversion:2000

Trust: 0.6

vendor:ciscomodel:vedge series routersscope:eqversion:1000

Trust: 0.6

vendor:ciscomodel:vedge series routersscope:eqversion:100

Trust: 0.6

vendor:ciscomodel:vsmart controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vmanage network managementscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vedge cloud routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:20000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:10000

Trust: 0.3

vendor:ciscomodel:vbond orchestratorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:sd-wanscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:sd-wanscope:neversion:18.3

Trust: 0.3

sources: CNVD: CNVD-2018-14076 // BID: 104854 // JVNDB: JVNDB-2018-008411 // CNNVD: CNNVD-201807-1303 // NVD: CVE-2018-0349

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0349
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-0349
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-14076
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201807-1303
value: CRITICAL

Trust: 0.6

VULHUB: VHN-118551
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0349
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0349
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-14076
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118551
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0349
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-0349
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-14076 // VULHUB: VHN-118551 // VULMON: CVE-2018-0349 // JVNDB: JVNDB-2018-008411 // CNNVD: CNNVD-201807-1303 // NVD: CVE-2018-0349

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-78

Trust: 1.1

sources: VULHUB: VHN-118551 // JVNDB: JVNDB-2018-008411 // NVD: CVE-2018-0349

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-1303

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201807-1303

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-008411

PATCH

title:cisco-sa-20180718-sdwan-fourl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo

Trust: 0.8

title:Patch for CiscoSD-WANSolution Remote File Overwrite Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/135519

Trust: 0.6

title:Cisco SD-WAN Solution Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82204

Trust: 0.6

title:Cisco: Cisco SD-WAN Solution Arbitrary File Overwrite Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180718-sdwan-fo

Trust: 0.1

sources: CNVD: CNVD-2018-14076 // VULMON: CVE-2018-0349 // JVNDB: JVNDB-2018-008411 // CNNVD: CNNVD-201807-1303

EXTERNAL IDS

db:NVDid:CVE-2018-0349

Trust: 3.5

db:BIDid:104854

Trust: 2.1

db:JVNDBid:JVNDB-2018-008411

Trust: 0.8

db:CNNVDid:CNNVD-201807-1303

Trust: 0.7

db:CNVDid:CNVD-2018-14076

Trust: 0.6

db:VULHUBid:VHN-118551

Trust: 0.1

db:VULMONid:CVE-2018-0349

Trust: 0.1

sources: CNVD: CNVD-2018-14076 // VULHUB: VHN-118551 // VULMON: CVE-2018-0349 // BID: 104854 // JVNDB: JVNDB-2018-008411 // CNNVD: CNNVD-201807-1303 // NVD: CVE-2018-0349

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180718-sdwan-fo

Trust: 2.2

url:http://www.securityfocus.com/bid/104854

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0349

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0349

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-14076 // VULHUB: VHN-118551 // VULMON: CVE-2018-0349 // BID: 104854 // JVNDB: JVNDB-2018-008411 // CNNVD: CNNVD-201807-1303 // NVD: CVE-2018-0349

CREDITS

Cisco

Trust: 0.3

sources: BID: 104854

SOURCES

db:CNVDid:CNVD-2018-14076
db:VULHUBid:VHN-118551
db:VULMONid:CVE-2018-0349
db:BIDid:104854
db:JVNDBid:JVNDB-2018-008411
db:CNNVDid:CNNVD-201807-1303
db:NVDid:CVE-2018-0349

LAST UPDATE DATE

2024-11-23T22:58:56.880000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-14076date:2018-07-27T00:00:00
db:VULHUBid:VHN-118551date:2020-08-31T00:00:00
db:VULMONid:CVE-2018-0349date:2020-08-31T00:00:00
db:BIDid:104854date:2018-07-18T00:00:00
db:JVNDBid:JVNDB-2018-008411date:2018-10-16T00:00:00
db:CNNVDid:CNNVD-201807-1303date:2020-09-02T00:00:00
db:NVDid:CVE-2018-0349date:2024-11-21T03:38:02.130

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-14076date:2018-07-27T00:00:00
db:VULHUBid:VHN-118551date:2018-07-18T00:00:00
db:VULMONid:CVE-2018-0349date:2018-07-18T00:00:00
db:BIDid:104854date:2018-07-18T00:00:00
db:JVNDBid:JVNDB-2018-008411date:2018-10-16T00:00:00
db:CNNVDid:CNNVD-201807-1303date:2018-07-19T00:00:00
db:NVDid:CVE-2018-0349date:2018-07-18T23:29:00.587