ID

VAR-201910-1493


CVE

CVE-2018-16417


TITLE

Aruba Instant Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-016143

DESCRIPTION

Aruba Instant 4.x prior to 6.4.4.8-4.2.4.12, 6.5.x prior to 6.5.4.11, 8.3.x prior to 8.3.0.6, and 8.4.x prior to 8.4.0.1 allows Command injection. Aruba Instant Contains an injection vulnerability.Information may be obtained. ALEAlcatelOmniAccessWirelessAccessPoint is a wireless access point device from ALE France. A security vulnerability exists in ALEAlcatelOmniAccessWirelessAccessPoint. An attacker could exploit the vulnerability to view configuration commands by sending a specially crafted URL. Siemens SCALANCE W1750D is prone to following security vulnerabilities: 1. Multiple information disclosure vulnerabilities 2. Multiple remote command injection vulnerabilities Attackers can exploit these issues to obtain sensitive information, or execute arbitrary commands or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks. Versions prior to SCALANCE W1750D 8.4.0.1 are vulnerable

Trust: 2.52

sources: NVD: CVE-2018-16417 // JVNDB: JVNDB-2018-016143 // CNVD: CNVD-2019-06344 // BID: 108374 // VULMON: CVE-2018-16417

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-06344

AFFECTED PRODUCTS

vendor:arubanetworksmodel:instantscope:gteversion:8.3.0.0

Trust: 1.0

vendor:siemensmodel:w1750dscope:ltversion:8.4.0.1

Trust: 1.0

vendor:arubanetworksmodel:instantscope:gteversion:8.4.0.0

Trust: 1.0

vendor:arubanetworksmodel:instantscope:ltversion:6.5.4.11

Trust: 1.0

vendor:arubanetworksmodel:instantscope:ltversion:8.3.0.6

Trust: 1.0

vendor:arubanetworksmodel:instantscope:ltversion:4.2.4.12

Trust: 1.0

vendor:arubanetworksmodel:instantscope:gteversion:4.0.0.0

Trust: 1.0

vendor:arubanetworksmodel:instantscope:ltversion:8.4.0.1

Trust: 1.0

vendor:arubanetworksmodel:instantscope:gteversion:6.5.0.0

Trust: 1.0

vendor:arubamodel:instantscope:ltversion:8.4.x

Trust: 0.8

vendor:arubamodel:instantscope:eqversion:8.4.0.1

Trust: 0.8

vendor:arubamodel:instantscope:eqversion:8.3.0.6

Trust: 0.8

vendor:arubamodel:instantscope:eqversion:6.5.4.11

Trust: 0.8

vendor:arubamodel:instantscope:ltversion:8.3.x

Trust: 0.8

vendor:arubamodel:instantscope:eqversion:6.4.4.8-4.2.4.12

Trust: 0.8

vendor:siemensmodel:w1750dscope: - version: -

Trust: 0.8

vendor:arubamodel:instantscope:ltversion:4.x

Trust: 0.8

vendor:arubamodel:instantscope:ltversion:6.5.x

Trust: 0.8

vendor:alemodel:alcatel omniaccess wireless access pointscope: - version: -

Trust: 0.6

vendor:siemensmodel:scalance w1750dscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:scalance w1750dscope:neversion:8.4.0.1

Trust: 0.3

sources: CNVD: CNVD-2019-06344 // BID: 108374 // JVNDB: JVNDB-2018-016143 // NVD: CVE-2018-16417

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-16417
value: HIGH

Trust: 1.0

NVD: CVE-2018-16417
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-06344
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201903-052
value: HIGH

Trust: 0.6

VULMON: CVE-2018-16417
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-16417
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-06344
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-16417
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-16417
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-06344 // VULMON: CVE-2018-16417 // JVNDB: JVNDB-2018-016143 // CNNVD: CNNVD-201903-052 // NVD: CVE-2018-16417

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-74

Trust: 0.8

sources: JVNDB: JVNDB-2018-016143 // NVD: CVE-2018-16417

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201903-052

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201903-052

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-016143

PATCH

title:ARUBA-PSA-2019-001url:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-001.txt

Trust: 0.8

title:SSA-549547url:https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf

Trust: 0.8

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=f04f471bbc12c6e00cc683978d7f0589

Trust: 0.1

sources: VULMON: CVE-2018-16417 // JVNDB: JVNDB-2018-016143

EXTERNAL IDS

db:NVDid:CVE-2018-16417

Trust: 3.4

db:ICS CERTid:ICSA-19-134-07

Trust: 2.8

db:BIDid:108374

Trust: 2.0

db:SIEMENSid:SSA-549547

Trust: 1.7

db:JVNDBid:JVNDB-2018-016143

Trust: 0.8

db:CNVDid:CNVD-2019-06344

Trust: 0.6

db:ICS CERTid:ICSA-19-134-02

Trust: 0.6

db:AUSCERTid:ESB-2019.1716.2

Trust: 0.6

db:CNNVDid:CNNVD-201903-052

Trust: 0.6

db:VULMONid:CVE-2018-16417

Trust: 0.1

sources: CNVD: CNVD-2019-06344 // VULMON: CVE-2018-16417 // BID: 108374 // JVNDB: JVNDB-2018-016143 // CNNVD: CNNVD-201903-052 // NVD: CVE-2018-16417

REFERENCES

url:http://www.securityfocus.com/bid/108374

Trust: 3.0

url:https://www.us-cert.gov/ics/advisories/icsa-19-134-07

Trust: 2.5

url:https://www.anquanke.com/vul/id/1652568

Trust: 1.7

url:https://www.arubanetworks.com/assets/alert/aruba-psa-2019-001.txt

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-16417

Trust: 1.4

url:https://vigilance.fr/vulnerability/alcatel-lucent-enterprise-omniaccess-wlan-instant-multiple-vulnerabilities-28646

Trust: 1.2

url:https://ics-cert.us-cert.gov/advisories/icsa-19-134-07

Trust: 1.0

url:http://www.siemens.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16417

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-19-134-02-0

Trust: 0.6

url:https://www.auscert.org.au/bulletins/80946

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-06344 // VULMON: CVE-2018-16417 // BID: 108374 // JVNDB: JVNDB-2018-016143 // CNNVD: CNNVD-201903-052 // NVD: CVE-2018-16417

CREDITS

Siemens reported these vulnerabilities to NCCIC.

Trust: 0.6

sources: CNNVD: CNNVD-201903-052

SOURCES

db:CNVDid:CNVD-2019-06344
db:VULMONid:CVE-2018-16417
db:BIDid:108374
db:JVNDBid:JVNDB-2018-016143
db:CNNVDid:CNNVD-201903-052
db:NVDid:CVE-2018-16417

LAST UPDATE DATE

2024-11-23T21:37:16.977000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-06344date:2019-03-06T00:00:00
db:VULMONid:CVE-2018-16417date:2020-08-24T00:00:00
db:BIDid:108374date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2018-016143date:2019-11-12T00:00:00
db:CNNVDid:CNNVD-201903-052date:2020-08-25T00:00:00
db:NVDid:CVE-2018-16417date:2024-11-21T03:52:42.423

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-06344date:2019-03-06T00:00:00
db:VULMONid:CVE-2018-16417date:2019-10-30T00:00:00
db:BIDid:108374date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2018-016143date:2019-11-12T00:00:00
db:CNNVDid:CNNVD-201903-052date:2019-03-04T00:00:00
db:NVDid:CVE-2018-16417date:2019-10-30T17:15:11.877