Show plain JSON{"id": "CVE-2018-0121", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2018-02-22T00:29:00.203", "references": [{"url": "http://www.securityfocus.com/bid/103113", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "http://www.securityfocus.com/bid/103113", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-287"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-287"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the authentication functionality of the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrator privileges on an affected system. The vulnerability is due to improper security restrictions that are imposed by the web-based service portal of the affected software. An attacker could exploit this vulnerability by submitting an empty password value to an affected portal when prompted to enter an administrative password for the portal. A successful exploit could allow the attacker to bypass authentication and gain administrator privileges for the web-based service portal of the affected software. This vulnerability affects Cisco Elastic Services Controller Software Release 3.0.0. Cisco Bug IDs: CSCvg29809."}, {"lang": "es", "value": "Una vulnerabilidad en la funcionalidad de autenticaci\u00f3n del portal del servicio web de Cisco Elastic Services Controller Software podr\u00eda permitir que un atacante remoto no autenticado omita la autenticaci\u00f3n y ejecute acciones arbitrarias con privilegios de administrador en un sistema afectado. La vulnerabilidad se debe a las restricciones de seguridad indebidas impuestas por el portal del servicio web del software afectado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un valor de contrase\u00f1a vac\u00edo a un portal afectado al pedir introducir una contrase\u00f1a administrativa del portal. Si se explota correctamente, esta vulnerabilidad podr\u00eda permitir que el atacante omita la autenticaci\u00f3n y obtenga privilegios de administrador al portal de servicios web del software afectado. La vulnerabilidad afecta a Cisco Elastic Services Controller Software Release 3.0.0. Cisco Bug IDs: CSCvg29809."}], "lastModified": "2024-11-21T03:37:33.873", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:elastic_services_controller:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E057F28-5562-43BA-ABD4-5CD04B47DE9E"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:virtual_managed_services:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "026CF0A3-6F34-443E-89CA-DDD84FB11854"}], "operator": "OR"}]}], "sourceIdentifier": "ykramarz@cisco.com"}