ID

VAR-201809-0281


CVE

CVE-2018-1150


TITLE

NUUO NVRMini2 Vulnerabilities related to security functions

Trust: 0.8

sources: JVNDB: JVNDB-2018-011478

DESCRIPTION

NUUO's NVRMini2 3.8.0 and below contains a backdoor that would allow an unauthenticated remote attacker to take over user accounts if the file /tmp/moses exists. NUUO NVRMini2 Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NUUO is one of the monitoring solution providers, and NUUO NVRMini 2 is a NAS-enabled NVR solution. There is a backdoor vulnerability in NUUO NVRMini2. When the target device file system has a specific file /tmp/moses/, the backdoor will be opened, and any unauthorized user can obtain the user list of the non-admin user and change the password by using the API to implement the takeover of the NVR device. An attacker can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. NVRmini2 and NVRsolo 3.8.0 and prior are vulnerable. NUUO NVRmini 2 is a video storage management device produced by American NUUO company. There is a security vulnerability in NUUO NVRMini 2 3.8.0 and earlier versions, which is caused by the backdoor in the program

Trust: 2.79

sources: NVD: CVE-2018-1150 // JVNDB: JVNDB-2018-011478 // CNVD: CNVD-2018-19318 // BID: 105720 // IVD: e2fb9480-39ab-11e9-9752-000c29342cb1 // VULHUB: VHN-121365 // VULMON: CVE-2018-1150

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2fb9480-39ab-11e9-9752-000c29342cb1 // CNVD: CNVD-2018-19318

AFFECTED PRODUCTS

vendor:nuuomodel:nvrmini2scope:lteversion:3.8.0

Trust: 1.0

vendor:nuuomodel:nvrmini 2scope:lteversion:3.8.0

Trust: 0.8

vendor:nuuomodel:nvrmini2scope:eqversion:03.07.0000.0011

Trust: 0.6

vendor:nuuomodel:nvrmini2scope:eqversion:03.08.0000.0005

Trust: 0.6

vendor:nuuomodel:nvrmini2scope:eqversion:3.8.0

Trust: 0.6

vendor:nuuomodel:nvrsoloscope:eqversion:3.8

Trust: 0.3

vendor:nuuomodel:nvrsoloscope:eqversion:3.0

Trust: 0.3

vendor:nuuomodel:nvrsoloscope:eqversion:2.0

Trust: 0.3

vendor:nuuomodel:nvrsoloscope:eqversion:1.0

Trust: 0.3

vendor:nuuomodel:nvrminiscope:eqversion:23.8

Trust: 0.3

vendor:nuuomodel:nvrminiscope:eqversion:23.0

Trust: 0.3

vendor:nuuomodel:nvrminiscope:eqversion:22.0

Trust: 0.3

vendor:nuuomodel:nvrminiscope:eqversion:21.7.5

Trust: 0.3

vendor:nuuomodel:nvrsoloscope:neversion:3.9.1

Trust: 0.3

vendor:nuuomodel:nvrminiscope:neversion:23.9.1

Trust: 0.3

vendor:nvrmini2model: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2fb9480-39ab-11e9-9752-000c29342cb1 // CNVD: CNVD-2018-19318 // BID: 105720 // JVNDB: JVNDB-2018-011478 // CNNVD: CNNVD-201809-863 // NVD: CVE-2018-1150

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-1150
value: HIGH

Trust: 1.0

NVD: CVE-2018-1150
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-19318
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-863
value: HIGH

Trust: 0.6

IVD: e2fb9480-39ab-11e9-9752-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-121365
value: HIGH

Trust: 0.1

VULMON: CVE-2018-1150
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-1150
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-19318
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2fb9480-39ab-11e9-9752-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-121365
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-1150
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.0

Trust: 1.8

sources: IVD: e2fb9480-39ab-11e9-9752-000c29342cb1 // CNVD: CNVD-2018-19318 // VULHUB: VHN-121365 // VULMON: CVE-2018-1150 // JVNDB: JVNDB-2018-011478 // CNNVD: CNNVD-201809-863 // NVD: CVE-2018-1150

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-254

Trust: 0.9

sources: VULHUB: VHN-121365 // JVNDB: JVNDB-2018-011478 // NVD: CVE-2018-1150

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-863

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201809-863

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011478

PATCH

title:NUUO version 3.9.1 Release date_2018.09url:https://www.nuuo.com/backend/CKEdit/upload/files/NUUO_NVRsolo_v3_9_1_Release%20note.pdf

Trust: 0.8

title:NUUO NVRmini 2 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84989

Trust: 0.6

title:Awesome CVE PoCurl:https://github.com/lnick2023/nicenice

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

sources: VULMON: CVE-2018-1150 // JVNDB: JVNDB-2018-011478 // CNNVD: CNNVD-201809-863

EXTERNAL IDS

db:NVDid:CVE-2018-1150

Trust: 3.7

db:TENABLEid:TRA-2018-25

Trust: 2.4

db:BIDid:105720

Trust: 2.1

db:ICS CERTid:ICSA-18-284-01

Trust: 1.2

db:CNNVDid:CNNVD-201809-863

Trust: 0.9

db:CNVDid:CNVD-2018-19318

Trust: 0.8

db:JVNDBid:JVNDB-2018-011478

Trust: 0.8

db:IVDid:E2FB9480-39AB-11E9-9752-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-121365

Trust: 0.1

db:VULMONid:CVE-2018-1150

Trust: 0.1

sources: IVD: e2fb9480-39ab-11e9-9752-000c29342cb1 // CNVD: CNVD-2018-19318 // VULHUB: VHN-121365 // VULMON: CVE-2018-1150 // BID: 105720 // JVNDB: JVNDB-2018-011478 // CNNVD: CNNVD-201809-863 // NVD: CVE-2018-1150

REFERENCES

url:https://www.tenable.com/security/research/tra-2018-25

Trust: 2.4

url:http://www.securityfocus.com/bid/105720

Trust: 1.8

url:https://www.nuuo.com/backend/ckedit/upload/files/nuuo_nvrsolo_v3_9_1_release%20note.pdf

Trust: 1.8

url:https://ics-cert.us-cert.gov/advisories/icsa-18-284-01

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1150

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-1150

Trust: 0.8

url:https://github.com/tenable/poc/tree/master/nuuo/nvrmini2

Trust: 0.6

url:http://www.nuuo.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

sources: CNVD: CNVD-2018-19318 // VULHUB: VHN-121365 // VULMON: CVE-2018-1150 // BID: 105720 // JVNDB: JVNDB-2018-011478 // CNNVD: CNNVD-201809-863 // NVD: CVE-2018-1150

CREDITS

Jacob Baines of Tenable

Trust: 0.3

sources: BID: 105720

SOURCES

db:IVDid:e2fb9480-39ab-11e9-9752-000c29342cb1
db:CNVDid:CNVD-2018-19318
db:VULHUBid:VHN-121365
db:VULMONid:CVE-2018-1150
db:BIDid:105720
db:JVNDBid:JVNDB-2018-011478
db:CNNVDid:CNNVD-201809-863
db:NVDid:CVE-2018-1150

LAST UPDATE DATE

2024-11-23T22:12:21.163000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-19318date:2018-09-19T00:00:00
db:VULHUBid:VHN-121365date:2019-10-03T00:00:00
db:VULMONid:CVE-2018-1150date:2019-10-03T00:00:00
db:BIDid:105720date:2018-10-11T00:00:00
db:JVNDBid:JVNDB-2018-011478date:2019-01-15T00:00:00
db:CNNVDid:CNNVD-201809-863date:2019-10-23T00:00:00
db:NVDid:CVE-2018-1150date:2024-11-21T03:59:17.417

SOURCES RELEASE DATE

db:IVDid:e2fb9480-39ab-11e9-9752-000c29342cb1date:2018-09-19T00:00:00
db:CNVDid:CNVD-2018-19318date:2018-09-19T00:00:00
db:VULHUBid:VHN-121365date:2018-09-19T00:00:00
db:VULMONid:CVE-2018-1150date:2018-09-19T00:00:00
db:BIDid:105720date:2018-10-11T00:00:00
db:JVNDBid:JVNDB-2018-011478date:2019-01-15T00:00:00
db:CNNVDid:CNNVD-201809-863date:2018-09-20T00:00:00
db:NVDid:CVE-2018-1150date:2018-09-19T15:29:06.280