ID

VAR-201801-1079


CVE

CVE-2018-0088


TITLE

Cisco Industrial Ethernet 4010 Runs on a series switch Cisco IOS Vulnerability related to authorization, authority, and access control in software

Trust: 0.8

sources: JVNDB: JVNDB-2018-001513

DESCRIPTION

A vulnerability in one of the diagnostic test CLI commands on Cisco Industrial Ethernet 4010 Series Switches running Cisco IOS Software could allow an authenticated, local attacker to impact the stability of the device. This could result in arbitrary code execution or a denial of service (DoS) condition. The attacker has to have valid user credentials at privilege level 15. The vulnerability is due to a diagnostic test CLI command that allows the attacker to write to the device memory. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a specific diagnostic test command at the CLI. An exploit could allow the attacker to overwrite system memory locations, which could have a negative impact on the stability of the device. Cisco Bug IDs: CSCvf71150. Vendors have confirmed this vulnerability Bug ID CSCvf71150 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state

Trust: 1.98

sources: NVD: CVE-2018-0088 // JVNDB: JVNDB-2018-001513 // BID: 105057 // VULHUB: VHN-118290

AFFECTED PRODUCTS

vendor:ciscomodel:industrial ethernet 4010 seriesscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:industrial ethernet 4010 series switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:industrial ethernet 4010 seriesscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:industrial ethernet series switchesscope:eqversion:40100

Trust: 0.3

sources: BID: 105057 // JVNDB: JVNDB-2018-001513 // CNNVD: CNNVD-201801-631 // NVD: CVE-2018-0088

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0088
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-0088
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201801-631
value: MEDIUM

Trust: 0.6

VULHUB: VHN-118290
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0088
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118290
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0088
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-118290 // JVNDB: JVNDB-2018-001513 // CNNVD: CNNVD-201801-631 // NVD: CVE-2018-0088

PROBLEMTYPE DATA

problemtype:CWE-732

Trust: 1.1

problemtype:CWE-399

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-118290 // JVNDB: JVNDB-2018-001513 // NVD: CVE-2018-0088

THREAT TYPE

local

Trust: 0.9

sources: BID: 105057 // CNNVD: CNNVD-201801-631

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201801-631

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-001513

PATCH

title:cisco-sa-20180117-iessurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-iess

Trust: 0.8

title:Cisco Industrial Ethernet 4010 Series Switches Cisco IOS Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77811

Trust: 0.6

sources: JVNDB: JVNDB-2018-001513 // CNNVD: CNNVD-201801-631

EXTERNAL IDS

db:NVDid:CVE-2018-0088

Trust: 2.8

db:SECTRACKid:1040240

Trust: 1.7

db:JVNDBid:JVNDB-2018-001513

Trust: 0.8

db:CNNVDid:CNNVD-201801-631

Trust: 0.7

db:BIDid:105057

Trust: 0.4

db:VULHUBid:VHN-118290

Trust: 0.1

sources: VULHUB: VHN-118290 // BID: 105057 // JVNDB: JVNDB-2018-001513 // CNNVD: CNNVD-201801-631 // NVD: CVE-2018-0088

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180117-iess

Trust: 2.0

url:http://www.securitytracker.com/id/1040240

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0088

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0088

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-118290 // BID: 105057 // JVNDB: JVNDB-2018-001513 // CNNVD: CNNVD-201801-631 // NVD: CVE-2018-0088

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 105057

SOURCES

db:VULHUBid:VHN-118290
db:BIDid:105057
db:JVNDBid:JVNDB-2018-001513
db:CNNVDid:CNNVD-201801-631
db:NVDid:CVE-2018-0088

LAST UPDATE DATE

2024-11-23T22:38:17.370000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118290date:2019-10-09T00:00:00
db:BIDid:105057date:2018-02-17T00:00:00
db:JVNDBid:JVNDB-2018-001513date:2018-02-22T00:00:00
db:CNNVDid:CNNVD-201801-631date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0088date:2024-11-21T03:37:29.883

SOURCES RELEASE DATE

db:VULHUBid:VHN-118290date:2018-01-18T00:00:00
db:BIDid:105057date:2018-02-17T00:00:00
db:JVNDBid:JVNDB-2018-001513date:2018-02-22T00:00:00
db:CNNVDid:CNNVD-201801-631date:2018-01-22T00:00:00
db:NVDid:CVE-2018-0088date:2018-01-18T06:29:00.377