ID

VAR-201810-0601


CVE

CVE-2018-15431


TITLE

Cisco Webex Network Recording Player and Webex Player Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011422

DESCRIPTION

A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system. Cisco Webex Network Recording Player and Webex Player Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. These issues are being tracked by Cisco Bug IDs CSCvj83752, CSCvj83767, CSCvj83771, CSCvj83793, CSCvj83797, CSCvj83803, CSCvj83818, CSCvj83824, CSCvj83831, CSCvj87929, CSCvj87934, CSCvj93870, CSCvj93877, CSCvk31089, CSCvk33049, CSCvk52510, CSCvk52518, CSCvk52521, CSCvk59945, CSCvk59949, CSCvk59950, CSCvk60158, CSCvk60163, CSCvm51315, CSCvm51318, CSCvm51361, CSCvm51371, CSCvm51373, CSCvm51374, CSCvm51382, CSCvm51386, CSCvm51391, CSCvm51393, CSCvm51396, CSCvm51398, CSCvm51412, CSCvm51413, CSCvm54531, and CSCvm54538

Trust: 1.98

sources: NVD: CVE-2018-15431 // JVNDB: JVNDB-2018-011422 // BID: 105520 // VULHUB: VHN-125690

AFFECTED PRODUCTS

vendor:ciscomodel:webex meetings serverscope:eqversion:3.0

Trust: 1.9

vendor:ciscomodel:webex business suite 32scope:ltversion:32.15.30

Trust: 1.0

vendor:ciscomodel:webex meetings onlinescope:ltversion:1.3.38

Trust: 1.0

vendor:ciscomodel:webex business suitescope: - version: -

Trust: 0.8

vendor:ciscomodel:webex meetings onlinescope: - version: -

Trust: 0.8

vendor:ciscomodel:webex meetings serverscope: - version: -

Trust: 0.8

vendor:ciscomodel:webex meetings onlinescope:eqversion: -

Trust: 0.6

vendor:ciscomodel:webex business suite 32scope:eqversion:32.15.10

Trust: 0.6

vendor:ciscomodel:webex business suite 32scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:webex meetings onlinescope:eqversion:1.3.37

Trust: 0.6

vendor:ciscomodel:webex playerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex network recording playerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings server 3.0mr2scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings server 3.0mr1scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings server patchscope:eqversion:3.01

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.8.1.2039

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.8.1.1034

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.8.1.1023

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.8.1.1019

Trust: 0.3

vendor:ciscomodel:webex meetings server spscope:eqversion:2.81

Trust: 0.3

vendor:ciscomodel:webex meetings server mr2scope:eqversion:2.8

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.8

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.7mr2 spscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.7.1.3047

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.7

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.6mr3 spscope:eqversion:4

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6.1.30

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6.0.8

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.5mr6 patchscope:eqversion:6

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.5mr2scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.99.2

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.1.5

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.0.997

Trust: 0.3

vendor:ciscomodel:webex meetings server mr1scope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:webex meetings server basescope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.0mr2scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.6

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.131

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.6)

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.131)

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings onlinescope:eqversion:1.3.35

Trust: 0.3

vendor:ciscomodel:webex meetings onlinescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex business suite wbs33scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex business suite wbs32scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex business suite wbs31scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings server 3.0mr2 patchscope:neversion:1

Trust: 0.3

vendor:ciscomodel:webex meetings onlinescope:neversion:1.3.37

Trust: 0.3

vendor:ciscomodel:webex business suite wbs33.4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:webex business suite wbs32.15.20scope:neversion: -

Trust: 0.3

vendor:ciscomodel:webex business suite wbs31.23scope:neversion: -

Trust: 0.3

sources: BID: 105520 // JVNDB: JVNDB-2018-011422 // CNNVD: CNNVD-201810-218 // NVD: CVE-2018-15431

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15431
value: HIGH

Trust: 1.0

NVD: CVE-2018-15431
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-218
value: HIGH

Trust: 0.6

VULHUB: VHN-125690
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-15431
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-125690
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15431
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-15431
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-125690 // JVNDB: JVNDB-2018-011422 // CNNVD: CNNVD-201810-218 // NVD: CVE-2018-15431

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-125690 // JVNDB: JVNDB-2018-011422 // NVD: CVE-2018-15431

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201810-218

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201810-218

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011422

PATCH

title:cisco-sa-20181003-webex-rceurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce

Trust: 0.8

title:Cisco Webex Network Recording Player and Webex Player Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85432

Trust: 0.6

sources: JVNDB: JVNDB-2018-011422 // CNNVD: CNNVD-201810-218

EXTERNAL IDS

db:NVDid:CVE-2018-15431

Trust: 2.8

db:BIDid:105520

Trust: 2.0

db:SECTRACKid:1041795

Trust: 1.7

db:JVNDBid:JVNDB-2018-011422

Trust: 0.8

db:CNNVDid:CNNVD-201810-218

Trust: 0.7

db:VULHUBid:VHN-125690

Trust: 0.1

sources: VULHUB: VHN-125690 // BID: 105520 // JVNDB: JVNDB-2018-011422 // CNNVD: CNNVD-201810-218 // NVD: CVE-2018-15431

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181003-webex-rce

Trust: 2.0

url:http://www.securityfocus.com/bid/105520

Trust: 1.7

url:http://www.securitytracker.com/id/1041795

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15431

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15431

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-125690 // BID: 105520 // JVNDB: JVNDB-2018-011422 // CNNVD: CNNVD-201810-218 // NVD: CVE-2018-15431

CREDITS

Trend Micro's Zero Day Initiative, Steven Seeley (mr_me), Michael Flanders, Yonghui Han of Fortinet, and Fortinet.

Trust: 0.3

sources: BID: 105520

SOURCES

db:VULHUBid:VHN-125690
db:BIDid:105520
db:JVNDBid:JVNDB-2018-011422
db:CNNVDid:CNNVD-201810-218
db:NVDid:CVE-2018-15431

LAST UPDATE DATE

2024-11-23T22:06:31.156000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125690date:2020-09-16T00:00:00
db:BIDid:105520date:2018-10-03T00:00:00
db:JVNDBid:JVNDB-2018-011422date:2019-01-11T00:00:00
db:CNNVDid:CNNVD-201810-218date:2020-10-22T00:00:00
db:NVDid:CVE-2018-15431date:2024-11-21T03:50:46.947

SOURCES RELEASE DATE

db:VULHUBid:VHN-125690date:2018-10-05T00:00:00
db:BIDid:105520date:2018-10-03T00:00:00
db:JVNDBid:JVNDB-2018-011422date:2019-01-11T00:00:00
db:CNNVDid:CNNVD-201810-218date:2018-10-08T00:00:00
db:NVDid:CVE-2018-15431date:2018-10-05T14:29:11.903