ID

VAR-201810-0308


CVE

CVE-2018-0433


TITLE

Cisco SD-WAN Solution Command Injection Vulnerability

Trust: 2.0

sources: CNVD: CNVD-2018-18790 // JVNDB: JVNDB-2018-013278 // CNNVD: CNNVD-201809-260

DESCRIPTION

A vulnerability in the command-line interface (CLI) in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges. Cisco SD-WAN Solution Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco vEdge 100 Series Routers is a 100 Series router product. vManageNetworkManagementSystem is a network management system. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a local command-injection vulnerability. This issue being tracked by Cisco Bug IDs CSCvi69802 and CSCvi69903

Trust: 2.52

sources: NVD: CVE-2018-0433 // JVNDB: JVNDB-2018-013278 // CNVD: CNVD-2018-18790 // BID: 105295 // VULHUB: VHN-118635

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-18790

AFFECTED PRODUCTS

vendor:ciscomodel:vmanage network management systemscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vsmart controllerscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vbond orchestratorscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vedge cloud router platformscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vedge 2000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 100scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 1000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 5000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vbond orchestratorscope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 100scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 1000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 2000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 5000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge cloud router platformscope: - version: -

Trust: 0.8

vendor:ciscomodel:vmanage network managementscope: - version: -

Trust: 0.8

vendor:ciscomodel:vsmart controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:sd-wan solutionscope:ltversion:18.3.0

Trust: 0.6

vendor:ciscomodel:vedge 5000scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion:16.9.3

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion:16.9.1

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion:16.9

Trust: 0.6

vendor:ciscomodel:vedge 2000scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:vsmart controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vmanage network managementscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vedge cloud routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:20000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:10000

Trust: 0.3

vendor:ciscomodel:vbond orchestratorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:sd-wanscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:sd-wanscope:neversion:18.3

Trust: 0.3

sources: CNVD: CNVD-2018-18790 // BID: 105295 // JVNDB: JVNDB-2018-013278 // CNNVD: CNNVD-201809-260 // NVD: CVE-2018-0433

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0433
value: HIGH

Trust: 1.0

NVD: CVE-2018-0433
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-18790
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-260
value: HIGH

Trust: 0.6

VULHUB: VHN-118635
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0433
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-18790
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118635
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0433
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-0433
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-18790 // VULHUB: VHN-118635 // JVNDB: JVNDB-2018-013278 // CNNVD: CNNVD-201809-260 // NVD: CVE-2018-0433

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.9

problemtype:CWE-78

Trust: 1.1

sources: VULHUB: VHN-118635 // JVNDB: JVNDB-2018-013278 // NVD: CVE-2018-0433

THREAT TYPE

local

Trust: 0.9

sources: BID: 105295 // CNNVD: CNNVD-201809-260

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201809-260

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013278

PATCH

title:cisco-sa-20180905-sd-wan-injectionurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-injection

Trust: 0.8

title:CiscoSD-WANSolution Command to Inject Vulnerability Patchesurl:https://www.cnvd.org.cn/patchInfo/show/140275

Trust: 0.6

title:Cisco SD-WAN Solution Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84591

Trust: 0.6

sources: CNVD: CNVD-2018-18790 // JVNDB: JVNDB-2018-013278 // CNNVD: CNNVD-201809-260

EXTERNAL IDS

db:NVDid:CVE-2018-0433

Trust: 3.4

db:BIDid:105295

Trust: 2.0

db:JVNDBid:JVNDB-2018-013278

Trust: 0.8

db:CNNVDid:CNNVD-201809-260

Trust: 0.7

db:CNVDid:CNVD-2018-18790

Trust: 0.6

db:VULHUBid:VHN-118635

Trust: 0.1

sources: CNVD: CNVD-2018-18790 // VULHUB: VHN-118635 // BID: 105295 // JVNDB: JVNDB-2018-013278 // CNNVD: CNNVD-201809-260 // NVD: CVE-2018-0433

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180905-sd-wan-injection

Trust: 2.0

url:http://www.securityfocus.com/bid/105295

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0433

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0433

Trust: 0.8

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0433

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2018-18790 // VULHUB: VHN-118635 // BID: 105295 // JVNDB: JVNDB-2018-013278 // CNNVD: CNNVD-201809-260 // NVD: CVE-2018-0433

CREDITS

Cisco

Trust: 0.3

sources: BID: 105295

SOURCES

db:CNVDid:CNVD-2018-18790
db:VULHUBid:VHN-118635
db:BIDid:105295
db:JVNDBid:JVNDB-2018-013278
db:CNNVDid:CNNVD-201809-260
db:NVDid:CVE-2018-0433

LAST UPDATE DATE

2024-08-14T14:19:47.626000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-18790date:2018-09-14T00:00:00
db:VULHUBid:VHN-118635date:2020-08-28T00:00:00
db:BIDid:105295date:2018-09-05T00:00:00
db:JVNDBid:JVNDB-2018-013278date:2019-02-18T00:00:00
db:CNNVDid:CNNVD-201809-260date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0433date:2020-08-28T18:46:36.733

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-18790date:2018-09-14T00:00:00
db:VULHUBid:VHN-118635date:2018-10-05T00:00:00
db:BIDid:105295date:2018-09-05T00:00:00
db:JVNDBid:JVNDB-2018-013278date:2019-02-18T00:00:00
db:CNNVDid:CNNVD-201809-260date:2018-09-06T00:00:00
db:NVDid:CVE-2018-0433date:2018-10-05T14:29:01.607