ID

VAR-201905-0979


CVE

CVE-2018-3701


TITLE

Intel(R) PROSet/Wireless WiFi Vulnerability related to authorization, authority, and access control in software

Trust: 0.8

sources: JVNDB: JVNDB-2019-004640

DESCRIPTION

Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) PROSet/Wireless WiFi The software contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel PROSet/Wireless WiFi Software is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges. Intel PROSet/Wireless WiFi Software version 20.100 and prior are vulnerable. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products

Trust: 1.98

sources: NVD: CVE-2018-3701 // JVNDB: JVNDB-2019-004640 // BID: 108387 // VULHUB: VHN-133732

AFFECTED PRODUCTS

vendor:intelmodel:proset\/wireless wifiscope:lteversion:20.100

Trust: 1.0

vendor:intelmodel:proset/wireless software driverscope:lteversion:20.100

Trust: 0.8

vendor:intelmodel:proset/wireless wifi softwarescope:eqversion:20.100

Trust: 0.3

vendor:intelmodel:proset/wireless wifi softwarescope:neversion:21.0

Trust: 0.3

sources: BID: 108387 // JVNDB: JVNDB-2019-004640 // NVD: CVE-2018-3701

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-3701
value: HIGH

Trust: 1.0

NVD: CVE-2018-3701
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-738
value: HIGH

Trust: 0.6

VULHUB: VHN-133732
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-3701
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-133732
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-3701
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-133732 // JVNDB: JVNDB-2019-004640 // CNNVD: CNNVD-201905-738 // NVD: CVE-2018-3701

PROBLEMTYPE DATA

problemtype:CWE-732

Trust: 1.1

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-133732 // JVNDB: JVNDB-2019-004640 // NVD: CVE-2018-3701

THREAT TYPE

local

Trust: 0.9

sources: BID: 108387 // CNNVD: CNNVD-201905-738

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201905-738

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004640

PATCH

title:INTEL-SA-00204url:https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00204.html

Trust: 0.8

sources: JVNDB: JVNDB-2019-004640

EXTERNAL IDS

db:NVDid:CVE-2018-3701

Trust: 2.8

db:BIDid:108387

Trust: 2.0

db:LENOVOid:LEN-27701

Trust: 1.7

db:JVNDBid:JVNDB-2019-004640

Trust: 0.8

db:CNNVDid:CNNVD-201905-738

Trust: 0.7

db:CNVDid:CNVD-2020-18599

Trust: 0.1

db:VULHUBid:VHN-133732

Trust: 0.1

sources: VULHUB: VHN-133732 // BID: 108387 // JVNDB: JVNDB-2019-004640 // CNNVD: CNNVD-201905-738 // NVD: CVE-2018-3701

REFERENCES

url:http://www.securityfocus.com/bid/108387

Trust: 2.3

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00204.html

Trust: 2.0

url:https://support.f5.com/csp/article/k00245734

Trust: 1.7

url:https://support.lenovo.com/us/en/product_security/len-27701

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-3701

Trust: 1.4

url:http://www.intel.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3701

Trust: 0.8

sources: VULHUB: VHN-133732 // BID: 108387 // JVNDB: JVNDB-2019-004640 // CNNVD: CNNVD-201905-738 // NVD: CVE-2018-3701

CREDITS

Stefan Kanthak

Trust: 0.9

sources: BID: 108387 // CNNVD: CNNVD-201905-738

SOURCES

db:VULHUBid:VHN-133732
db:BIDid:108387
db:JVNDBid:JVNDB-2019-004640
db:CNNVDid:CNNVD-201905-738
db:NVDid:CVE-2018-3701

LAST UPDATE DATE

2024-11-23T20:12:37.313000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-133732date:2019-10-03T00:00:00
db:BIDid:108387date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-004640date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-738date:2019-10-08T00:00:00
db:NVDid:CVE-2018-3701date:2024-11-21T04:05:54.890

SOURCES RELEASE DATE

db:VULHUBid:VHN-133732date:2019-05-17T00:00:00
db:BIDid:108387date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-004640date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-738date:2019-05-17T00:00:00
db:NVDid:CVE-2018-3701date:2019-05-17T16:29:00.737