ID

VAR-201811-0177


CVE

CVE-2018-15439


TITLE

Cisco Small Business Switches Vulnerability in the use of hard-coded credentials in software

Trust: 0.8

sources: JVNDB: JVNDB-2018-011646

DESCRIPTION

A vulnerability in the Cisco Small Business Switches software could allow an unauthenticated, remote attacker to bypass the user authentication mechanism of an affected device. The vulnerability exists because under specific circumstances, the affected software enables a privileged user account without notifying administrators of the system. An attacker could exploit this vulnerability by using this account to log in to an affected device and execute commands with full admin rights. Cisco has not released software updates that address this vulnerability. This advisory will be updated with fixed software information once fixed software becomes available. There is a workaround to address this vulnerability. CiscoSmallBusiness200SeriesSmartSwitches are small smart switch devices from Cisco. SmallBusinessSwitchesSoftware is a set of switch software that runs on it. This issue is being tracked by Cisco bugs CSCvk20713 and CSCvm11846

Trust: 2.61

sources: NVD: CVE-2018-15439 // JVNDB: JVNDB-2018-011646 // CNVD: CNVD-2019-00343 // BID: 105873 // VULHUB: VHN-125698 // VULMON: CVE-2018-15439

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-00343

AFFECTED PRODUCTS

vendor:ciscomodel:sg250-50hpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg550x-48mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf500-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350xg-2f10scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf500-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350x-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-52pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf550x-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf550x-48mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500x-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350x-24mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf200-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500-52pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg550x-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-10sfpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf350-48mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350-10scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-52mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250x-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg550x-24mppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500x-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-18scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-10fpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500-28mppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-52scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-26scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg550x-24mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350xg-24tscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-08pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-20scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-10scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-18scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500xg-8f8tscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf250-48hpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-28mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg355-10pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg550x-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sx550x-52scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-24mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf350-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-10pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf550x-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-26pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350-10pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350x-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf500-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf500-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-26scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf302-08mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf200-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sx550x-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf250-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf302-08mppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sx550x-24ftscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-50pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-10mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg550x-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350-28mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350x-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-10ppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf250-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250x-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350xg-48tscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-08hpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500x-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-24ppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500-28scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500-28pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf550x-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-48ppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf200-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-28ppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-28scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-50scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-08scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350x-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sx550x-12fscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500x-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250x-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf302-08ppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350-10mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-50scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sx550x-16ftscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf200-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf550x-24mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg550x-24pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350x-48mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-08scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500-52scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350xg-24fscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf250-24scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-50fpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf300-08scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg200-26fpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-10mppscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-10pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf302-08pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg500-52mpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-26hpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sx550x-24fscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250x-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf350-48scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350-28pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf550x-48pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf302-08scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg300-28pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-50pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg350-28scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sf200-24fpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sg250-26pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:series managed switchesscope:eqversion:3500

Trust: 0.9

vendor:ciscomodel:small business switchesscope: - version: -

Trust: 0.8

vendor:ciscomodel:series stackable managed switchesscope:eqversion:550x

Trust: 0.6

vendor:ciscomodel:small business series managed switchesscope:eqversion:300

Trust: 0.6

vendor:ciscomodel:series stackable managed switchesscope:eqversion:350x

Trust: 0.6

vendor:ciscomodel:series smart switchesscope:eqversion:250

Trust: 0.6

vendor:ciscomodel:small business series stackable managed switchesscope:eqversion:500

Trust: 0.6

vendor:ciscomodel:small business series smart switchesscope:eqversion:200

Trust: 0.6

vendor:ciscomodel:small business switchesscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:small business series stackable managed switchscope:eqversion:5000

Trust: 0.3

vendor:ciscomodel:small business series managed switchesscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:small business series smart switchesscope:eqversion:2000

Trust: 0.3

vendor:ciscomodel:series stackable managed switchesscope:eqversion:550x0

Trust: 0.3

vendor:ciscomodel:series stackable managed switchesscope:eqversion:350x0

Trust: 0.3

vendor:ciscomodel:series smart switchesscope:eqversion:2500

Trust: 0.3

sources: CNVD: CNVD-2019-00343 // BID: 105873 // JVNDB: JVNDB-2018-011646 // CNNVD: CNNVD-201811-180 // NVD: CVE-2018-15439

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15439
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2018-15439
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-15439
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-00343
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201811-180
value: CRITICAL

Trust: 0.6

VULHUB: VHN-125698
value: HIGH

Trust: 0.1

VULMON: CVE-2018-15439
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-15439
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-00343
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-125698
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15439
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2018-15439
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2018-15439
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-00343 // VULHUB: VHN-125698 // VULMON: CVE-2018-15439 // JVNDB: JVNDB-2018-011646 // CNNVD: CNNVD-201811-180 // NVD: CVE-2018-15439 // NVD: CVE-2018-15439

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-125698 // JVNDB: JVNDB-2018-011646 // NVD: CVE-2018-15439

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201811-180

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201811-180

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011646

PATCH

title:cisco-sa-20181107-sbsw-privaccurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sbsw-privacc

Trust: 0.8

title:CiscoSmallBusinessSwitches authentication bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/149219

Trust: 0.6

title:Cisco Small Business Switches Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86652

Trust: 0.6

title:Cisco: Cisco Small Business Switches Privileged Access Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20181107-sbsw-privacc

Trust: 0.1

title:Threatposturl:https://threatpost.com/critical-unpatched-cisco-flaw/141010/

Trust: 0.1

title:Threatposturl:https://threatpost.com/cisco-accidentally-released-dirty-cow-exploit-code-in-software/138888/

Trust: 0.1

sources: CNVD: CNVD-2019-00343 // VULMON: CVE-2018-15439 // JVNDB: JVNDB-2018-011646 // CNNVD: CNNVD-201811-180

EXTERNAL IDS

db:NVDid:CVE-2018-15439

Trust: 3.5

db:BIDid:105873

Trust: 2.7

db:JVNDBid:JVNDB-2018-011646

Trust: 0.8

db:CNNVDid:CNNVD-201811-180

Trust: 0.7

db:CNVDid:CNVD-2019-00343

Trust: 0.6

db:VULHUBid:VHN-125698

Trust: 0.1

db:VULMONid:CVE-2018-15439

Trust: 0.1

sources: CNVD: CNVD-2019-00343 // VULHUB: VHN-125698 // VULMON: CVE-2018-15439 // BID: 105873 // JVNDB: JVNDB-2018-011646 // CNNVD: CNNVD-201811-180 // NVD: CVE-2018-15439

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-sbsw-privacc

Trust: 3.4

url:http://www.securityfocus.com/bid/105873

Trust: 1.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15439

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15439

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/critical-unpatched-cisco-flaw/141010/

Trust: 0.1

sources: CNVD: CNVD-2019-00343 // VULHUB: VHN-125698 // VULMON: CVE-2018-15439 // BID: 105873 // JVNDB: JVNDB-2018-011646 // CNNVD: CNNVD-201811-180 // NVD: CVE-2018-15439

CREDITS

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Trust: 0.6

sources: CNNVD: CNNVD-201811-180

SOURCES

db:CNVDid:CNVD-2019-00343
db:VULHUBid:VHN-125698
db:VULMONid:CVE-2018-15439
db:BIDid:105873
db:JVNDBid:JVNDB-2018-011646
db:CNNVDid:CNNVD-201811-180
db:NVDid:CVE-2018-15439

LAST UPDATE DATE

2024-11-23T22:48:32.513000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-00343date:2019-01-04T00:00:00
db:VULHUBid:VHN-125698date:2020-08-28T00:00:00
db:VULMONid:CVE-2018-15439date:2020-08-28T00:00:00
db:BIDid:105873date:2018-11-07T00:00:00
db:JVNDBid:JVNDB-2018-011646date:2019-01-18T00:00:00
db:CNNVDid:CNNVD-201811-180date:2020-10-22T00:00:00
db:NVDid:CVE-2018-15439date:2024-11-21T03:50:48.200

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-00343date:2019-01-04T00:00:00
db:VULHUBid:VHN-125698date:2018-11-08T00:00:00
db:VULMONid:CVE-2018-15439date:2018-11-08T00:00:00
db:BIDid:105873date:2018-11-07T00:00:00
db:JVNDBid:JVNDB-2018-011646date:2019-01-18T00:00:00
db:CNNVDid:CNNVD-201811-180date:2018-11-08T00:00:00
db:NVDid:CVE-2018-15439date:2018-11-08T17:29:00.607