{"id": "CVE-2018-0345", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": true, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2018-07-18T23:29:00.383", "references": [{"url": "http://www.securityfocus.com/bid/104859", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "http://www.securityfocus.com/bid/104859", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-20"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-88"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the configuration and management database of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. The vulnerability is due to insufficient validation of command arguments that are passed to the configuration and management database of the affected software. An attacker could exploit this vulnerability by creating custom functions that contain malicious code and are executed as the vmanage user of the configuration management system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the vmanage user in the configuration management system of the affected software. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69937."}, {"lang": "es", "value": "Una vulnerabilidad en la base de datos de configuraci\u00f3n y gesti\u00f3n de Cisco SD-WAN Solution podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios con privilegios de usuario vmanage en el sistema de gesti\u00f3n de configuraci\u00f3n de un sistema afectado. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de argumentos de comando que se pasan a la base de datos de configuraci\u00f3n y gesti\u00f3n del software afectado. Un atacante podr\u00eda explotar esta vulnerabilidad creando funciones personalizadas que contienen c\u00f3digo malicioso y se ejecutan como el usuario vmanage del sistema de gesti\u00f3n de configuraci\u00f3n. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos arbitrarios con privilegios de usuario vmanage en el sistema de gesti\u00f3n de configuraci\u00f3n del sistema afectado. Esta vulnerabilidad afecta a los siguientes productos Cisco si ejecutan una versi\u00f3n de Cisco SD-WAN Solution anterior a la 18.3.0: vBond Orchestrator Software, vManage Network Management Software y vSmart Controller Software. Cisco Bug IDs: CSCvi69937."}], "lastModified": "2024-11-21T03:38:01.573", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA648664-0734-4D02-8944-CA4DF4D756D6"}, {"criteria": "cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8828CED0-5B61-4BC9-B222-2295507E5FB7"}, {"criteria": "cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "937B8016-77E1-4F8C-8701-6AFFE36F6A49"}, {"criteria": "cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDF9528B-1D1E-4CF2-ABA8-D01CC6F4A8BD"}, {"criteria": "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F16884C-A2EE-4867-8806-6418E000078C"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07BDB466-E5FC-40FF-8400-836551AD4AE5", "versionEndExcluding": "18.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "493ED5A7-3F08-4C2B-8259-F945088C42C4", "versionEndExcluding": "18.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A89574B-5FA1-45D2-92F5-E6AE60B21AAC", "versionEndExcluding": "18.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A124EBDB-1E4D-44FF-8647-342ACB7FC536", "versionEndExcluding": "18.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F33875D3-8A95-4201-B385-FA63CCDBE103", "versionEndExcluding": "18.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D486E57-9E41-4744-AB0C-56B706B6989C", "versionEndExcluding": "18.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C78995CF-3005-496D-A168-F9EEF09EEF44", "versionEndExcluding": "18.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}