ID

VAR-201809-1154


CVE

CVE-2018-5393


TITLE

TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks

Trust: 0.8

sources: CERT/CC: VU#581311

DESCRIPTION

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode. TP-LINK EAP Controller Is vulnerable to a lack of authentication for critical functions.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apache Commons Collections (ACC) The library deserialization process is vulnerable. Java Application ACC When using the library directly or within the range accessible by specifying the class path ACC If a library is installed, arbitrary code may be executed. Apache Commons Collections (ACC) Library http://commons.apache.org/proper/commons-collections/ Deserialize untrusted data (CWE-502) 2015 Year 1 Held on the moon AppSec California 2015 In Gabriel Lawrence Mr. and Chris Frohoff He talked about a vulnerability that could deserialize untrusted data and showed that it could execute arbitrary code. Any use of the serialization function that is not appropriate Java Application or Java Libraries are affected by this vulnerability. Deserialize untrusted data (CWE-502) http://cwe.mitre.org/data/definitions/502.html Gabriel Lawrence Mr. and Chris Frohoff Mr. Lecture http://frohoff.github.io/appseccali-marshalling-pickles/ 2015 Year 11 A month Foxglove Security of Stephen Breen Mr. this problem Apache Commons Collections (ACC) Exist in the library, especially for deserializing untrusted data InvokerTransformer It was pointed out that arbitrary code could be executed when using classes. ACC Software that uses the library, WebSphere , Jenkins , WebLogic , OpenNMS Etc. are also affected. Foxglove Security of Stephen Breen Mr (What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability.) http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ Jenkins https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11 WebLogic http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html?elq_mid=31793&sh=&cmid=WWSU12091612MPP001C179 ACC Library version 3.2.1 , 4.0 Both are affected by this vulnerability. version 3.2.1 , 4.0 https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread Apache Software Fondation Has posted an official view of the vulnerability on its blog. Here you can find advice on countermeasures and links to related information. In addition, entries related to this vulnerability (COLLECTIONS-580) Is built on a bug management system. Official view https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread Entries related to this vulnerability (COLLECTIONS-580) https://issues.apache.org/jira/browse/COLLECTIONS-580 ACC other than, Groovy And Spring The same problem is being investigated for these issues. Lawrence Mr. and Frohoff In his presentation material, Java not only Python And Ruby It is stated that the same problem exists in applications and libraries written in the above. Regardless of the programming language or library used, it is important to fully consider the data serialization capabilities from the software design stage.Apache Commons Collections I'm using a library Java Application or Java Library is optional Java It may be possible to execute code. Also, ACC Even if the library is not used directly, it can be accessed by specifying the class path. ACC If the library exists, any Java It may be possible to execute code. It can extend or add Java collections framework. TP-LINK EAP Controller is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. EAP Controller version 2.5.3 and prior are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Cisco Security Advisory: Vulnerability in Java Deserialization Affecting Cisco Products Advisory ID: cisco-sa-20151209-java-deserialization Revision 1.0 For Public Release: 2015 December 9 16:00 GMT +--------------------------------------------------------------------- Summary ======= A vulnerability in the Java deserialization used by the Apache Commons Collections (ACC) library could allow an unauthenticated, remote attacker to execute arbitrary code. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. The report contains detailed proof-of-concept code for a number of applications, including WebSphere Application Server, JBoss, Jenkins, OpenNMS, and WebLogic. A wide range of potential impacts includes allowing the attacker to obtain sensitive information. Object serialization is a technique that many programming languages use to convert an object into a sequence of bits for transfer purposes. Deserialization is a technique that reassembles those bits back to an object. Many applications accept serialized objects from the network without performing input validation checks before deserializing it. Additional details about the vulnerability are available at the following links: Official Vulnerability Note from CERT: http://www.kb.cert.org/vuls/id/576313 Foxglove Security: http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ Apache Commons Statement: https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread Oracle Security Alert: https://blogs.oracle.com/security/entry/security_alert_cve_2015_4852 Cisco will release software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJWaE9BAAoJEIpI1I6i1Mx31a0QALya6VDmcGiyx3AlCzsKGISc 3NJP4PPjVFGjHQmB/+bXn1zXLZ63JgbOZuG9pLxhmJpPMxQI8jeXEHqzVmrA9cOj u/QRGkITxQaRS50cwFJXPDOVWWCTcHLhuk83Ofih8vhC8UPBy1FGMBl5rpVLDkG9 ue8yX5ACEQ078F78dpcnJmbv1Hxu021wI+nM3pn7C/aOrJ1wSNop8KkFZ+VHzbKY aeuMFqhal+ePx+JoIC4JMrTll/BLxjI17tKrzXas6D4zKNGSO0WxnEFjDWuPlc89 2y3DnaVc0eeAVPy3ODN6wJzuro4w69z1GrvXPkBfVe9WNKD1lMGRUPMRwnb/zjxu DT8Ms4LDaVCLDZ01ox3BpuZIDBP1q2Xk6ToObeHUNMSDM9IuMeVOz9BtxJxO8Yp/ YfVaoqkM6Vrf5oXKUvWow0r19+ODp18JUnc8qT7Cj0b9PwtlOUqpsNE+cAzPyZh7 UBYLPm2AZypOgw4ryUf66p3l+NGLvLdA+A1u0m+YfXSrsuEFCosUeppmZMvgzEME 7TDSbOlt6yj9W/U3ioYbhLWk1D2whTyDybXz4MLaPTPxfxozyePOcthU7R/PVGrU M0Do8nugnDXE0rYVRooF3+A/6ahoKUb9QR00O4xN4A94lfXqgc6t+180S4vavgxS g9ZP7zYVhaDCRufDoNVI =nsL1 -----END PGP SIGNATURE-----

Trust: 4.95

sources: NVD: CVE-2018-5393 // CERT/CC: VU#581311 // JVNDB: JVNDB-2018-013057 // JVNDB: JVNDB-2015-005930 // CNVD: CNVD-2019-13604 // CNNVD: CNNVD-201512-421 // BID: 105402 // BID: 77521 // VULHUB: VHN-135424 // VULMON: CVE-2018-5393 // PACKETSTORM: 134752

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-13604

AFFECTED PRODUCTS

vendor:tp linkmodel:eap controllerscope:lteversion:2.5.3

Trust: 1.8

vendor:tp linkmodel:eap controllerscope:eqversion:2.5.3

Trust: 1.5

vendor:tp linkmodel:eap controllerscope:eqversion:2.4.8

Trust: 0.9

vendor:tp linkmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel:capssuitescope: - version: -

Trust: 0.8

vendor:necmodel:infoframe relational storescope: - version: -

Trust: 0.8

vendor:necmodel:systemdirector enterprisescope: - version: -

Trust: 0.8

vendor:necmodel:webotxscope: - version: -

Trust: 0.8

vendor:jenkins cimodel:jenkinsscope:eqversion:0

Trust: 0.3

vendor:apachemodel:commons collectionsscope:eqversion:3.2.1

Trust: 0.3

vendor:apachemodel:commons collectionsscope:eqversion:4.0

Trust: 0.3

vendor:apachemodel:commons collectionsscope:eqversion:3.0

Trust: 0.3

sources: CERT/CC: VU#581311 // CNVD: CNVD-2019-13604 // BID: 105402 // BID: 77521 // JVNDB: JVNDB-2018-013057 // JVNDB: JVNDB-2015-005930 // CNNVD: CNNVD-201809-1168 // NVD: CVE-2018-5393

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5393
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-5393
value: CRITICAL

Trust: 0.8

IPA: JVNDB-2015-005930
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-13604
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-1168
value: CRITICAL

Trust: 0.6

VULHUB: VHN-135424
value: HIGH

Trust: 0.1

VULMON: CVE-2018-5393
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-5393
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

IPA: JVNDB-2015-005930
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2019-13604
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-135424
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5393
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-13604 // VULHUB: VHN-135424 // VULMON: CVE-2018-5393 // JVNDB: JVNDB-2018-013057 // JVNDB: JVNDB-2015-005930 // CNNVD: CNNVD-201809-1168 // NVD: CVE-2018-5393

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.9

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-135424 // JVNDB: JVNDB-2018-013057 // JVNDB: JVNDB-2015-005930 // NVD: CVE-2018-5393

THREAT TYPE

remote

Trust: 1.3

sources: PACKETSTORM: 134752 // CNNVD: CNNVD-201512-421 // CNNVD: CNNVD-201809-1168

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201809-1168

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013057

PATCH

title:EAP Controllerurl:https://www.tp-link.com/us/products/details/cat-4908_EAP-Controller.html

Trust: 0.8

title:Apache Commons statement to widespread Java object de-serialisation vulnerabilityurl:https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread

Trust: 0.8

title:COLLECTIONS-580: Arbitrary remote code execution with InvokerTransformerurl:https://issues.apache.org/jira/browse/COLLECTIONS-580

Trust: 0.8

title:cisco-sa-20151209-java-deserializationurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization

Trust: 0.8

title:HS16-010url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS16-010/index.html

Trust: 0.8

title:1970575url:http://www-01.ibm.com/support/docview.wss?uid=swg21970575

Trust: 0.8

title:Jenkins Security Advisory 2015-11-11url:https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11

Trust: 0.8

title:NV16-002url:http://jpn.nec.com/security-info/secinfo/nv16-002.html

Trust: 0.8

title:Secure Coding Guidelines for Java SEurl:http://www.oracle.com/technetwork/java/seccodeguide-139067.html#8

Trust: 0.8

title:Oracle Security Alert for CVE-2015-4852url:http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html

Trust: 0.8

title:HS16-010url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS16-010/index.html

Trust: 0.8

title:日立ディスクアレイシステムにおけるSVP セキュリティホールurl:http://www.hitachi.co.jp/products/it/storage-solutions/techsupport/sec_info/sec_acc20160328.html

Trust: 0.8

title:TP-LinkEAPControllerforLinux authentication bypasses the patch for the vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/160751

Trust: 0.6

title:TP-Link EAP Controller for Linux Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85202

Trust: 0.6

title:Java-Deserialization-CVEsurl:https://github.com/PalindromeLabs/Java-Deserialization-CVEs

Trust: 0.1

sources: CNVD: CNVD-2019-13604 // VULMON: CVE-2018-5393 // JVNDB: JVNDB-2018-013057 // JVNDB: JVNDB-2015-005930 // CNNVD: CNNVD-201809-1168

EXTERNAL IDS

db:CERT/CCid:VU#581311

Trust: 3.7

db:NVDid:CVE-2018-5393

Trust: 3.5

db:BIDid:105402

Trust: 2.1

db:CERT/CCid:VU#576313

Trust: 2.0

db:BIDid:77521

Trust: 0.9

db:JVNDBid:JVNDB-2018-013057

Trust: 0.8

db:JVNid:JVNVU94276522

Trust: 0.8

db:JVNDBid:JVNDB-2015-005930

Trust: 0.8

db:CNNVDid:CNNVD-201809-1168

Trust: 0.7

db:CNVDid:CNVD-2019-13604

Trust: 0.6

db:CNNVDid:CNNVD-201512-421

Trust: 0.6

db:VULHUBid:VHN-135424

Trust: 0.1

db:VULMONid:CVE-2018-5393

Trust: 0.1

db:PACKETSTORMid:134752

Trust: 0.1

sources: CERT/CC: VU#581311 // CNVD: CNVD-2019-13604 // VULHUB: VHN-135424 // VULMON: CVE-2018-5393 // BID: 105402 // BID: 77521 // JVNDB: JVNDB-2018-013057 // JVNDB: JVNDB-2015-005930 // PACKETSTORM: 134752 // CNNVD: CNNVD-201512-421 // CNNVD: CNNVD-201809-1168 // NVD: CVE-2018-5393

REFERENCES

url:https://www.kb.cert.org/vuls/id/581311

Trust: 3.0

url:https://www.kb.cert.org/vuls/id/576313

Trust: 2.0

url:http://www.securityfocus.com/bid/105402

Trust: 1.9

url:https://www.tp-link.com/en/download/eap220.html#controller_software

Trust: 1.4

url:http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/

Trust: 1.2

url:http://cwe.mitre.org/data/definitions/306.html

Trust: 0.9

url:https://docs.oracle.com/javase/8/docs/technotes/guides/rmi/rmi_security_recommendations.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/502.html

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5393

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5393

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94276522/index.html

Trust: 0.8

url:http://frohoff.github.io/appseccali-marshalling-pickles/

Trust: 0.8

url:http://www.securityfocus.com/bid/77521

Trust: 0.6

url:http://www.tp-link.com

Trust: 0.3

url:https://issues.apache.org/jira/browse/collections-580

Trust: 0.3

url:http://seclists.org/oss-sec/2015/q4/237

Trust: 0.3

url:http://seclists.org/oss-sec/2015/q4/241

Trust: 0.3

url:https://nvd.nist.gov

Trust: 0.1

url:https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread

Trust: 0.1

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151209-java-deserialization

Trust: 0.1

url:https://blogs.oracle.com/security/entry/security_alert_cve_2015_4852

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

sources: CERT/CC: VU#581311 // CNVD: CNVD-2019-13604 // VULHUB: VHN-135424 // VULMON: CVE-2018-5393 // BID: 105402 // BID: 77521 // JVNDB: JVNDB-2018-013057 // JVNDB: JVNDB-2015-005930 // PACKETSTORM: 134752 // CNNVD: CNNVD-201512-421 // CNNVD: CNNVD-201809-1168 // NVD: CVE-2018-5393

CREDITS

foxglovesecurity

Trust: 0.9

sources: BID: 77521 // CNNVD: CNNVD-201512-421

SOURCES

db:CERT/CCid:VU#581311
db:CNVDid:CNVD-2019-13604
db:VULHUBid:VHN-135424
db:VULMONid:CVE-2018-5393
db:BIDid:105402
db:BIDid:77521
db:JVNDBid:JVNDB-2018-013057
db:JVNDBid:JVNDB-2015-005930
db:PACKETSTORMid:134752
db:CNNVDid:CNNVD-201512-421
db:CNNVDid:CNNVD-201809-1168
db:NVDid:CVE-2018-5393

LAST UPDATE DATE

2024-11-23T21:13:15.103000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#581311date:2018-11-08T00:00:00
db:CNVDid:CNVD-2019-13604date:2019-05-10T00:00:00
db:VULHUBid:VHN-135424date:2019-10-09T00:00:00
db:VULMONid:CVE-2018-5393date:2019-10-09T00:00:00
db:BIDid:105402date:2018-09-18T00:00:00
db:BIDid:77521date:2015-12-08T22:09:00
db:JVNDBid:JVNDB-2018-013057date:2019-02-14T00:00:00
db:JVNDBid:JVNDB-2015-005930date:2018-02-07T00:00:00
db:CNNVDid:CNNVD-201512-421date:2015-12-18T00:00:00
db:CNNVDid:CNNVD-201809-1168date:2019-10-17T00:00:00
db:NVDid:CVE-2018-5393date:2024-11-21T04:08:44.320

SOURCES RELEASE DATE

db:CERT/CCid:VU#581311date:2018-09-26T00:00:00
db:CNVDid:CNVD-2019-13604date:2019-05-10T00:00:00
db:VULHUBid:VHN-135424date:2018-09-28T00:00:00
db:VULMONid:CVE-2018-5393date:2018-09-28T00:00:00
db:BIDid:105402date:2018-09-18T00:00:00
db:BIDid:77521date:2015-11-08T00:00:00
db:JVNDBid:JVNDB-2018-013057date:2019-02-14T00:00:00
db:JVNDBid:JVNDB-2015-005930date:2015-11-17T00:00:00
db:PACKETSTORMid:134752date:2015-12-10T17:22:52
db:CNNVDid:CNNVD-201512-421date:2015-11-08T00:00:00
db:CNNVDid:CNNVD-201809-1168date:2018-09-27T00:00:00
db:NVDid:CVE-2018-5393date:2018-09-28T17:29:00.483