ID

VAR-201905-0985


CVE

CVE-2018-7082


TITLE

Aruba Instant Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-015420

DESCRIPTION

A command injection vulnerability is present in Aruba Instant that permits an authenticated administrative user to execute arbitrary commands on the underlying operating system. A malicious administrator could use this ability to install backdoors or change system configuration in a way that would not be logged. Workaround: None. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0. ALEAlcatelOmniAccessWirelessAccessPoint is a wireless access point device from ALE France. A command injection vulnerability exists in ALEAlcatelOmniAccessWirelessAccessPoint. The vulnerability stems from the fact that external input data constructs executable commands, and the network system or product does not properly filter the special elements. An attacker could exploit the vulnerability to execute an illegal command. Siemens SCALANCE W1750D is prone to following security vulnerabilities: 1. Multiple information disclosure vulnerabilities 2. A cross-site-scripting vulnerability 3. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks. Versions prior to SCALANCE W1750D 8.4.0.1 are vulnerable

Trust: 2.52

sources: NVD: CVE-2018-7082 // JVNDB: JVNDB-2018-015420 // CNVD: CNVD-2019-15207 // BID: 108374 // VULMON: CVE-2018-7082

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-15207

AFFECTED PRODUCTS

vendor:arubanetworksmodel:aruba instantscope:gteversion:8.3.0.0

Trust: 1.0

vendor:arubanetworksmodel:aruba instantscope:gteversion:4.0

Trust: 1.0

vendor:arubanetworksmodel:aruba instantscope:gteversion:8.4.0

Trust: 1.0

vendor:siemensmodel:scalance w1750dscope:ltversion:8.4.0.1

Trust: 1.0

vendor:arubanetworksmodel:aruba instantscope:ltversion:6.5.4.11

Trust: 1.0

vendor:arubanetworksmodel:aruba instantscope:ltversion:8.3.0.6

Trust: 1.0

vendor:arubanetworksmodel:aruba instantscope:ltversion:8.4.0.1

Trust: 1.0

vendor:arubanetworksmodel:aruba instantscope:gteversion:6.5.0

Trust: 1.0

vendor:arubanetworksmodel:aruba instantscope:ltversion:4.2.4.12

Trust: 1.0

vendor:arubamodel:instant apscope: - version: -

Trust: 0.8

vendor:alemodel:alcatel omniaccess wireless access pointscope: - version: -

Trust: 0.6

vendor:siemensmodel:scalance w1750dscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:scalance w1750dscope:neversion:8.4.0.1

Trust: 0.3

sources: CNVD: CNVD-2019-15207 // BID: 108374 // JVNDB: JVNDB-2018-015420 // NVD: CVE-2018-7082

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-7082
value: HIGH

Trust: 1.0

NVD: CVE-2018-7082
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-15207
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201903-047
value: HIGH

Trust: 0.6

VULMON: CVE-2018-7082
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-7082
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-15207
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-7082
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-7082
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-15207 // VULMON: CVE-2018-7082 // JVNDB: JVNDB-2018-015420 // CNNVD: CNNVD-201903-047 // NVD: CVE-2018-7082

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 0.8

sources: JVNDB: JVNDB-2018-015420 // NVD: CVE-2018-7082

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201903-047

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201903-047

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015420

PATCH

title:ARUBA-PSA-2019-001url:http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-001.txt

Trust: 0.8

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=f04f471bbc12c6e00cc683978d7f0589

Trust: 0.1

sources: VULMON: CVE-2018-7082 // JVNDB: JVNDB-2018-015420

EXTERNAL IDS

db:NVDid:CVE-2018-7082

Trust: 3.4

db:BIDid:108374

Trust: 2.6

db:ICS CERTid:ICSA-19-134-07

Trust: 1.8

db:SIEMENSid:SSA-549547

Trust: 1.7

db:JVNDBid:JVNDB-2018-015420

Trust: 0.8

db:CNVDid:CNVD-2019-15207

Trust: 0.6

db:ICS CERTid:ICSA-19-134-02

Trust: 0.6

db:AUSCERTid:ESB-2019.1716.2

Trust: 0.6

db:CNNVDid:CNNVD-201903-047

Trust: 0.6

db:VULMONid:CVE-2018-7082

Trust: 0.1

sources: CNVD: CNVD-2019-15207 // VULMON: CVE-2018-7082 // BID: 108374 // JVNDB: JVNDB-2018-015420 // CNNVD: CNNVD-201903-047 // NVD: CVE-2018-7082

REFERENCES

url:http://www.securityfocus.com/bid/108374

Trust: 2.9

url:https://www.arubanetworks.com/assets/alert/aruba-psa-2019-001.txt

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-7082

Trust: 1.4

url:https://ics-cert.us-cert.gov/advisories/icsa-19-134-07

Trust: 1.0

url:http://www.siemens.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7082

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-19-134-07

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-19-134-02-0

Trust: 0.6

url:https://vigilance.fr/vulnerability/alcatel-lucent-enterprise-omniaccess-wlan-instant-multiple-vulnerabilities-28646

Trust: 0.6

url:https://www.auscert.org.au/bulletins/80946

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://cert-portal.siemens.com/productcert/txt/ssa-549547.txt

Trust: 0.1

sources: CNVD: CNVD-2019-15207 // VULMON: CVE-2018-7082 // BID: 108374 // JVNDB: JVNDB-2018-015420 // CNNVD: CNNVD-201903-047 // NVD: CVE-2018-7082

CREDITS

Siemens reported these vulnerabilities to NCCIC.

Trust: 0.6

sources: CNNVD: CNNVD-201903-047

SOURCES

db:CNVDid:CNVD-2019-15207
db:VULMONid:CVE-2018-7082
db:BIDid:108374
db:JVNDBid:JVNDB-2018-015420
db:CNNVDid:CNNVD-201903-047
db:NVDid:CVE-2018-7082

LAST UPDATE DATE

2024-11-23T21:37:17.076000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-15207date:2019-05-24T00:00:00
db:VULMONid:CVE-2018-7082date:2023-02-02T00:00:00
db:BIDid:108374date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2018-015420date:2019-07-08T00:00:00
db:CNNVDid:CNNVD-201903-047date:2020-10-28T00:00:00
db:NVDid:CVE-2018-7082date:2024-11-21T04:11:37.253

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-15207date:2019-05-24T00:00:00
db:VULMONid:CVE-2018-7082date:2019-05-10T00:00:00
db:BIDid:108374date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2018-015420date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201903-047date:2019-03-04T00:00:00
db:NVDid:CVE-2018-7082date:2019-05-10T17:29:01.110