var-201805-0505
Vulnerability from variot
A vulnerability in the assignment and management of default user accounts for Secure Shell (SSH) access to Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running Cisco Mobility Express Software could allow an authenticated, remote attacker to gain elevated privileges on an affected access point. The vulnerability exists because the Cisco Mobility Express controller of the affected software configures the default SSH user account for an access point to be the first SSH user account that was created for the Mobility Express controller, if an administrator added user accounts directly to the controller instead of using the default configuration or the SSH username creation wizard. Although the user account has read-only privileges for the Mobility Express controller, the account could have administrative privileges for an associated access point. An attacker who has valid user credentials for an affected controller could exploit this vulnerability by using the default SSH user account to authenticate to an affected access point via SSH. A successful exploit could allow the attacker to log in to the affected access point with administrative privileges and perform arbitrary administrative actions. This vulnerability affects the following Cisco products: Aironet 1800 Series Access Points that are running Cisco Mobility Express Software Releases 8.2.121.0 through 8.5.105.0, Aironet 2800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0, Aironet 3800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0. Cisco Bug IDs: CSCva68116. Cisco Aironet Access Point Contains vulnerabilities related to certificate and password management. Vendors have confirmed this vulnerability Bug ID CSCva68116 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MobilityExpressSoftware is a set of management control software running on it. Multiple Cisco Products are prone to a remote privilege-escalation vulnerability. A remote attacker can exploit this issue to bypass certain restrictions and gain elevated privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0505", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mobility express software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.4\\(1.65\\)" }, { "model": "mobility express software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.3\\(90.65\\)" }, { "model": "aironet access point software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.2.121.0 to 8.5.105.0" }, { "model": "aironet access point software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.3.102.0 to 8.5.105.0" }, { "model": "mobility express software \u003e=releases", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.2.121.0\u003c=8.5.105.01800" }, { "model": "mobility express software \u003e=releases", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.3.102.0\u003c=8.5.105.028003800" }, { "model": "mobility express software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.105.0" }, { "model": "mobility express software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.102.0" }, { "model": "mobility express software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.121.0" }, { "model": "aironet series access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "38000" }, { "model": "aironet series access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "28000" }, { "model": "aironet series access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "18000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "BID", "id": "104124" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "CNNVD", "id": "CNNVD-201805-091" }, { "db": "NVD", "id": "CVE-2018-0226" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:aironet_access_point_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-004908" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco.", "sources": [ { "db": "BID", "id": "104124" } ], "trust": 0.3 }, "cve": "CVE-2018-0226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CVE-2018-0226", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2018-09054", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "VHN-118428", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.6, "id": "CVE-2018-0226", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-0226", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-0226", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-09054", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201805-091", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-118428", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "VULHUB", "id": "VHN-118428" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "CNNVD", "id": "CNNVD-201805-091" }, { "db": "NVD", "id": "CVE-2018-0226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the assignment and management of default user accounts for Secure Shell (SSH) access to Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running Cisco Mobility Express Software could allow an authenticated, remote attacker to gain elevated privileges on an affected access point. The vulnerability exists because the Cisco Mobility Express controller of the affected software configures the default SSH user account for an access point to be the first SSH user account that was created for the Mobility Express controller, if an administrator added user accounts directly to the controller instead of using the default configuration or the SSH username creation wizard. Although the user account has read-only privileges for the Mobility Express controller, the account could have administrative privileges for an associated access point. An attacker who has valid user credentials for an affected controller could exploit this vulnerability by using the default SSH user account to authenticate to an affected access point via SSH. A successful exploit could allow the attacker to log in to the affected access point with administrative privileges and perform arbitrary administrative actions. This vulnerability affects the following Cisco products: Aironet 1800 Series Access Points that are running Cisco Mobility Express Software Releases 8.2.121.0 through 8.5.105.0, Aironet 2800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0, Aironet 3800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0. Cisco Bug IDs: CSCva68116. Cisco Aironet Access Point Contains vulnerabilities related to certificate and password management. Vendors have confirmed this vulnerability Bug ID CSCva68116 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MobilityExpressSoftware is a set of management control software running on it. Multiple Cisco Products are prone to a remote privilege-escalation vulnerability. \nA remote attacker can exploit this issue to bypass certain restrictions and gain elevated privileges", "sources": [ { "db": "NVD", "id": "CVE-2018-0226" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "BID", "id": "104124" }, { "db": "VULHUB", "id": "VHN-118428" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0226", "trust": 3.4 }, { "db": "SECTRACK", "id": "1040817", "trust": 2.3 }, { "db": "BID", "id": "104124", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2018-004908", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-09054", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201805-091", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118428", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "VULHUB", "id": "VHN-118428" }, { "db": "BID", "id": "104124" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "CNNVD", "id": "CNNVD-201805-091" }, { "db": "NVD", "id": "CVE-2018-0226" } ] }, "id": "VAR-201805-0505", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "VULHUB", "id": "VHN-118428" } ], "trust": 1.19107143 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09054" } ] }, "last_update_date": "2024-11-23T22:30:26.882000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180502-aironet-ssh", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-aironet-ssh" }, { "title": "CiscoAironet has a patch for an elevation of privilege vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/128265" }, { "title": "Cisco Aironet 1800 , 2800 and 3800 Series Access Points Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79827" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "CNNVD", "id": "CNNVD-201805-091" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118428" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "NVD", "id": "CVE-2018-0226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180502-aironet-ssh" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/104124" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1040817" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0226" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0226" }, { "trust": 0.6, "url": "https://securitytracker.com/id/1040817" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "VULHUB", "id": "VHN-118428" }, { "db": "BID", "id": "104124" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "CNNVD", "id": "CNNVD-201805-091" }, { "db": "NVD", "id": "CVE-2018-0226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-09054" }, { "db": "VULHUB", "id": "VHN-118428" }, { "db": "BID", "id": "104124" }, { "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "db": "CNNVD", "id": "CNNVD-201805-091" }, { "db": "NVD", "id": "CVE-2018-0226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-09054" }, { "date": "2018-05-02T00:00:00", "db": "VULHUB", "id": "VHN-118428" }, { "date": "2018-05-02T00:00:00", "db": "BID", "id": "104124" }, { "date": "2018-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "date": "2018-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-091" }, { "date": "2018-05-02T22:29:00.247000", "db": "NVD", "id": "CVE-2018-0226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-09054" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118428" }, { "date": "2018-05-02T00:00:00", "db": "BID", "id": "104124" }, { "date": "2018-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-004908" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-091" }, { "date": "2024-11-21T03:37:46.360000", "db": "NVD", "id": "CVE-2018-0226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-091" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Aironet Access Point Vulnerabilities related to certificate and password management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-004908" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-091" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.