ID

VAR-201805-0947


CVE

CVE-2018-8869


TITLE

Lantech IDS 2102 Input validation vulnerability

Trust: 2.2

sources: IVD: e2eec341-39ab-11e9-8bce-000c29342cb1 // CNVD: CNVD-2018-09214 // JVNDB: JVNDB-2018-004583 // CNNVD: CNNVD-201805-176

DESCRIPTION

In Lantech IDS 2102 2.0 and prior, nearly all input fields allow for arbitrary input on the device. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Lantech IDS 2102 Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Lantech IDS 2102 is an Ethernet device server. An input validation vulnerability exists in Lantech IDS 2102 2.0 and earlier. A remote attacker can exploit the vulnerability to execute arbitrary code by constructing malicious input. Lantech IDS 2102 is prone to the following multiple security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. Failed exploit attempts will likely cause a denial-of-service condition

Trust: 2.79

sources: NVD: CVE-2018-8869 // JVNDB: JVNDB-2018-004583 // CNVD: CNVD-2018-09214 // BID: 104098 // IVD: e2eec341-39ab-11e9-8bce-000c29342cb1 // VULHUB: VHN-138901 // VULMON: CVE-2018-8869

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2eec341-39ab-11e9-8bce-000c29342cb1 // CNVD: CNVD-2018-09214

AFFECTED PRODUCTS

vendor:lantechmodel:ids 2102scope:eqversion: -

Trust: 1.6

vendor:lantechmodel:ids-2102ascope:lteversion:2.0

Trust: 0.8

vendor:lantechmodel:idsscope:eqversion:2102<=2.0

Trust: 0.6

vendor:lantechmodel:idsscope:eqversion:21022.0

Trust: 0.3

vendor:ids 2102model: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2eec341-39ab-11e9-8bce-000c29342cb1 // CNVD: CNVD-2018-09214 // BID: 104098 // JVNDB: JVNDB-2018-004583 // CNNVD: CNNVD-201805-176 // NVD: CVE-2018-8869

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-8869
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-8869
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-09214
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201805-176
value: CRITICAL

Trust: 0.6

IVD: e2eec341-39ab-11e9-8bce-000c29342cb1
value: CRITICAL

Trust: 0.2

VULHUB: VHN-138901
value: HIGH

Trust: 0.1

VULMON: CVE-2018-8869
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-8869
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-09214
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2eec341-39ab-11e9-8bce-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-138901
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-8869
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2eec341-39ab-11e9-8bce-000c29342cb1 // CNVD: CNVD-2018-09214 // VULHUB: VHN-138901 // VULMON: CVE-2018-8869 // JVNDB: JVNDB-2018-004583 // CNNVD: CNNVD-201805-176 // NVD: CVE-2018-8869

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-138901 // JVNDB: JVNDB-2018-004583 // NVD: CVE-2018-8869

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201805-176

TYPE

Input validation error

Trust: 0.8

sources: IVD: e2eec341-39ab-11e9-8bce-000c29342cb1 // CNNVD: CNNVD-201805-176

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004583

PATCH

title:IDS-2102Aurl:http://www.lantechcom.tw/global/eng/industrial-serial-devices.html

Trust: 0.8

sources: JVNDB: JVNDB-2018-004583

EXTERNAL IDS

db:NVDid:CVE-2018-8869

Trust: 3.7

db:ICS CERTid:ICSA-18-123-01

Trust: 3.5

db:BIDid:104098

Trust: 2.1

db:CNVDid:CNVD-2018-09214

Trust: 0.8

db:CNNVDid:CNNVD-201805-176

Trust: 0.8

db:JVNDBid:JVNDB-2018-004583

Trust: 0.8

db:IVDid:E2EEC341-39AB-11E9-8BCE-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-138901

Trust: 0.1

db:VULMONid:CVE-2018-8869

Trust: 0.1

sources: IVD: e2eec341-39ab-11e9-8bce-000c29342cb1 // CNVD: CNVD-2018-09214 // VULHUB: VHN-138901 // VULMON: CVE-2018-8869 // BID: 104098 // JVNDB: JVNDB-2018-004583 // CNNVD: CNNVD-201805-176 // NVD: CVE-2018-8869

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-123-01

Trust: 3.6

url:http://www.securityfocus.com/bid/104098

Trust: 1.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8869

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-8869

Trust: 0.8

url:https://www.lantech.com/?region=1

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-09214 // VULHUB: VHN-138901 // VULMON: CVE-2018-8869 // BID: 104098 // JVNDB: JVNDB-2018-004583 // CNNVD: CNNVD-201805-176 // NVD: CVE-2018-8869

CREDITS

Florian Adamsky

Trust: 0.3

sources: BID: 104098

SOURCES

db:IVDid:e2eec341-39ab-11e9-8bce-000c29342cb1
db:CNVDid:CNVD-2018-09214
db:VULHUBid:VHN-138901
db:VULMONid:CVE-2018-8869
db:BIDid:104098
db:JVNDBid:JVNDB-2018-004583
db:CNNVDid:CNNVD-201805-176
db:NVDid:CVE-2018-8869

LAST UPDATE DATE

2024-11-23T22:26:23.251000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-09214date:2018-05-10T00:00:00
db:VULHUBid:VHN-138901date:2019-10-09T00:00:00
db:VULMONid:CVE-2018-8869date:2019-10-09T00:00:00
db:BIDid:104098date:2018-05-03T00:00:00
db:JVNDBid:JVNDB-2018-004583date:2018-06-25T00:00:00
db:CNNVDid:CNNVD-201805-176date:2019-10-17T00:00:00
db:NVDid:CVE-2018-8869date:2024-11-21T04:14:29.503

SOURCES RELEASE DATE

db:IVDid:e2eec341-39ab-11e9-8bce-000c29342cb1date:2018-05-10T00:00:00
db:CNVDid:CNVD-2018-09214date:2018-05-10T00:00:00
db:VULHUBid:VHN-138901date:2018-05-04T00:00:00
db:VULMONid:CVE-2018-8869date:2018-05-04T00:00:00
db:BIDid:104098date:2018-05-03T00:00:00
db:JVNDBid:JVNDB-2018-004583date:2018-06-25T00:00:00
db:CNNVDid:CNNVD-201805-176date:2018-05-07T00:00:00
db:NVDid:CVE-2018-8869date:2018-05-04T17:29:00.677