ID

VAR-201810-0560


CVE

CVE-2018-15368


TITLE

Cisco IOS XE Software CLI Parser Input Validation Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2018-20779 // CNNVD: CNNVD-201809-1262

DESCRIPTION

A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerability is due to the affected software improperly sanitizing command arguments to prevent modifications to the underlying Linux filesystem on a device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device. Cisco IOS XE software Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOSXESoftware is a set of operating systems developed by Cisco for its network devices. CLIparser is one of the command line command parsers. An input validation vulnerability exists in the CLI parser in Cisco IOSXESoftware. Local attackers can exploit the CLI commands with specially crafted parameters. Cisco IOS XE Software is prone to an local arbitrary command-execution vulnerability

Trust: 2.61

sources: NVD: CVE-2018-15368 // JVNDB: JVNDB-2018-010835 // CNVD: CNVD-2018-20779 // BID: 108911 // VULHUB: VHN-125620 // VULMON: CVE-2018-15368

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-20779

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:15.4\(3\)s

Trust: 1.6

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xe softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 15.4 sscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2018-20779 // BID: 108911 // JVNDB: JVNDB-2018-010835 // CNNVD: CNNVD-201809-1262 // NVD: CVE-2018-15368

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15368
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-15368
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-20779
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-1262
value: MEDIUM

Trust: 0.6

VULHUB: VHN-125620
value: HIGH

Trust: 0.1

VULMON: CVE-2018-15368
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-15368
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-20779
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-125620
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15368
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-15368
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-20779 // VULHUB: VHN-125620 // VULMON: CVE-2018-15368 // JVNDB: JVNDB-2018-010835 // CNNVD: CNNVD-201809-1262 // NVD: CVE-2018-15368

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-78

Trust: 1.1

sources: VULHUB: VHN-125620 // JVNDB: JVNDB-2018-010835 // NVD: CVE-2018-15368

THREAT TYPE

local

Trust: 0.9

sources: BID: 108911 // CNNVD: CNNVD-201809-1262

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 108911 // CNNVD: CNNVD-201809-1262

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-010835

PATCH

title:cisco-sa-20180926-privescurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-privesc

Trust: 0.8

title:Cisco IOSXESoftwareCLI parser input patch for verification vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/142199

Trust: 0.6

title:Cisco IOS XE Software CLI Parser input validation vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85271

Trust: 0.6

title:Cisco: Cisco IOS XE Software Privileged EXEC Mode Root Shell Access Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180926-privesc

Trust: 0.1

sources: CNVD: CNVD-2018-20779 // VULMON: CVE-2018-15368 // JVNDB: JVNDB-2018-010835 // CNNVD: CNNVD-201809-1262

EXTERNAL IDS

db:NVDid:CVE-2018-15368

Trust: 3.5

db:JVNDBid:JVNDB-2018-010835

Trust: 0.8

db:CNNVDid:CNNVD-201809-1262

Trust: 0.7

db:CNVDid:CNVD-2018-20779

Trust: 0.6

db:BIDid:108911

Trust: 0.3

db:VULHUBid:VHN-125620

Trust: 0.1

db:VULMONid:CVE-2018-15368

Trust: 0.1

sources: CNVD: CNVD-2018-20779 // VULHUB: VHN-125620 // VULMON: CVE-2018-15368 // BID: 108911 // JVNDB: JVNDB-2018-010835 // CNNVD: CNNVD-201809-1262 // NVD: CVE-2018-15368

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-privesc

Trust: 2.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15368

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15368

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-20779 // VULHUB: VHN-125620 // VULMON: CVE-2018-15368 // BID: 108911 // JVNDB: JVNDB-2018-010835 // CNNVD: CNNVD-201809-1262 // NVD: CVE-2018-15368

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 108911

SOURCES

db:CNVDid:CNVD-2018-20779
db:VULHUBid:VHN-125620
db:VULMONid:CVE-2018-15368
db:BIDid:108911
db:JVNDBid:JVNDB-2018-010835
db:CNNVDid:CNNVD-201809-1262
db:NVDid:CVE-2018-15368

LAST UPDATE DATE

2024-08-14T14:19:47.160000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-20779date:2018-10-12T00:00:00
db:VULHUBid:VHN-125620date:2020-08-28T00:00:00
db:VULMONid:CVE-2018-15368date:2020-08-28T00:00:00
db:BIDid:108911date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-010835date:2018-12-25T00:00:00
db:CNNVDid:CNNVD-201809-1262date:2019-10-17T00:00:00
db:NVDid:CVE-2018-15368date:2020-08-28T18:49:13.037

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-20779date:2018-10-12T00:00:00
db:VULHUBid:VHN-125620date:2018-10-05T00:00:00
db:VULMONid:CVE-2018-15368date:2018-10-05T00:00:00
db:BIDid:108911date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-010835date:2018-12-25T00:00:00
db:CNNVDid:CNNVD-201809-1262date:2018-09-28T00:00:00
db:NVDid:CVE-2018-15368date:2018-10-05T14:29:05.873