ID

VAR-201810-0309


CVE

CVE-2018-0434


TITLE

Cisco SD-WAN Solution Vulnerabilities related to certificate validation

Trust: 0.8

sources: JVNDB: JVNDB-2018-010841

DESCRIPTION

A vulnerability in the Zero Touch Provisioning feature of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software. Cisco SD-WAN Solution Contains a certificate validation vulnerability.Information may be obtained and information may be altered. Cisco vEdge 100 Series Routers and so on are products of Cisco. The Cisco vEdge 100 Series Routers is a 100 Series router product. vManageNetworkManagementSystem is a network management system. SD-WANSolution is a set of network expansion solutions running in it. Cisco SD-WAN is prone to a security-bypass vulnerability. This issue is being tracked by Cisco Bug ID CSCvi69940

Trust: 2.52

sources: NVD: CVE-2018-0434 // JVNDB: JVNDB-2018-010841 // CNVD: CNVD-2018-18789 // BID: 105294 // VULHUB: VHN-118636

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-18789

AFFECTED PRODUCTS

vendor:ciscomodel:vmanage network management systemscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:vedge 2000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 100scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 1000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 5000scope:ltversion:18.3.0

Trust: 1.0

vendor:ciscomodel:vedge 100scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 1000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 2000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 5000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vmanage network managementscope: - version: -

Trust: 0.8

vendor:ciscomodel:sd-wan solutionscope:ltversion:18.3.0

Trust: 0.6

vendor:ciscomodel:vedge 5000scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion:16.9.3

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion:16.9.1

Trust: 0.6

vendor:ciscomodel:vedge 100scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:vedge 1000scope:eqversion:16.9

Trust: 0.6

vendor:ciscomodel:vedge 2000scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:vmanage network managementscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:20000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:10000

Trust: 0.3

vendor:ciscomodel:vedge series routersscope:eqversion:1000

Trust: 0.3

vendor:ciscomodel:sd-wanscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:sd-wanscope:neversion:18.3

Trust: 0.3

sources: CNVD: CNVD-2018-18789 // BID: 105294 // JVNDB: JVNDB-2018-010841 // CNNVD: CNNVD-201809-259 // NVD: CVE-2018-0434

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0434
value: HIGH

Trust: 1.0

NVD: CVE-2018-0434
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-18789
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-259
value: HIGH

Trust: 0.6

VULHUB: VHN-118636
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-0434
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-18789
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118636
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0434
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-18789 // VULHUB: VHN-118636 // JVNDB: JVNDB-2018-010841 // CNNVD: CNNVD-201809-259 // NVD: CVE-2018-0434

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.9

sources: VULHUB: VHN-118636 // JVNDB: JVNDB-2018-010841 // NVD: CVE-2018-0434

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-259

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201809-259

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-010841

PATCH

title:cisco-sa-20180905-sd-wan-validationurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-validation

Trust: 0.8

title:Patch for CiscoSD-WANSolution Certificate Validation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/140273

Trust: 0.6

title:Cisco SD-WAN Solution Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84590

Trust: 0.6

sources: CNVD: CNVD-2018-18789 // JVNDB: JVNDB-2018-010841 // CNNVD: CNNVD-201809-259

EXTERNAL IDS

db:NVDid:CVE-2018-0434

Trust: 3.4

db:BIDid:105294

Trust: 2.0

db:JVNDBid:JVNDB-2018-010841

Trust: 0.8

db:CNNVDid:CNNVD-201809-259

Trust: 0.7

db:CNVDid:CNVD-2018-18789

Trust: 0.6

db:VULHUBid:VHN-118636

Trust: 0.1

sources: CNVD: CNVD-2018-18789 // VULHUB: VHN-118636 // BID: 105294 // JVNDB: JVNDB-2018-010841 // CNNVD: CNNVD-201809-259 // NVD: CVE-2018-0434

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180905-sd-wan-validation

Trust: 2.0

url:http://www.securityfocus.com/bid/105294

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0434

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0434

Trust: 0.8

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0434

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2018-18789 // VULHUB: VHN-118636 // BID: 105294 // JVNDB: JVNDB-2018-010841 // CNNVD: CNNVD-201809-259 // NVD: CVE-2018-0434

CREDITS

Cisco

Trust: 0.3

sources: BID: 105294

SOURCES

db:CNVDid:CNVD-2018-18789
db:VULHUBid:VHN-118636
db:BIDid:105294
db:JVNDBid:JVNDB-2018-010841
db:CNNVDid:CNNVD-201809-259
db:NVDid:CVE-2018-0434

LAST UPDATE DATE

2024-08-14T15:13:00.551000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-18789date:2018-09-14T00:00:00
db:VULHUBid:VHN-118636date:2019-10-09T00:00:00
db:BIDid:105294date:2018-09-05T00:00:00
db:JVNDBid:JVNDB-2018-010841date:2018-12-25T00:00:00
db:CNNVDid:CNNVD-201809-259date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0434date:2019-10-09T23:32:04.477

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-18789date:2018-09-05T00:00:00
db:VULHUBid:VHN-118636date:2018-10-05T00:00:00
db:BIDid:105294date:2018-09-05T00:00:00
db:JVNDBid:JVNDB-2018-010841date:2018-12-25T00:00:00
db:CNNVDid:CNNVD-201809-259date:2018-09-06T00:00:00
db:NVDid:CVE-2018-0434date:2018-10-05T14:29:01.700