ID

VAR-201806-1278


CVE

CVE-2018-12591


TITLE

Ubiquiti Networks EdgeSwitch In OS Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-006619

DESCRIPTION

Ubiquiti Networks EdgeSwitch version 1.7.3 and prior suffer from an improperly neutralized element in an OS command due to lack of protection on the admin CLI, leading to code execution and privilege escalation greater than administrators themselves are allowed. An attacker with access to an admin account could escape the restricted CLI and execute arbitrary shell instructions. Ubiquiti Networks EdgeSwitch Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. UbiquitiEdgeSwitch is a Gigabit network switch device from Ubiquiti Networks. A security vulnerability exists in UbiquitiEdgeSwitch 1.7.3 and earlier that was caused by a lack of protection for adminCLI. An attacker could exploit the vulnerability to execute code and increase privileges

Trust: 2.25

sources: NVD: CVE-2018-12591 // JVNDB: JVNDB-2018-006619 // CNVD: CNVD-2018-11987 // VULHUB: VHN-122566

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-11987

AFFECTED PRODUCTS

vendor:ubntmodel:edgeswitchscope:lteversion:1.7.3

Trust: 1.0

vendor:ubiquitimodel:edgeswitchscope:lteversion:1.7.3

Trust: 0.8

vendor:ubiquitimodel:networks edgeswitchscope:lteversion:<=1.7.3

Trust: 0.6

vendor:ubntmodel:edgeswitchscope:eqversion:1.7.3

Trust: 0.6

sources: CNVD: CNVD-2018-11987 // JVNDB: JVNDB-2018-006619 // CNNVD: CNNVD-201806-1074 // NVD: CVE-2018-12591

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-12591
value: HIGH

Trust: 1.0

NVD: CVE-2018-12591
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-11987
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-1074
value: CRITICAL

Trust: 0.6

VULHUB: VHN-122566
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-12591
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-11987
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-122566
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-12591
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-11987 // VULHUB: VHN-122566 // JVNDB: JVNDB-2018-006619 // CNNVD: CNNVD-201806-1074 // NVD: CVE-2018-12591

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-122566 // JVNDB: JVNDB-2018-006619 // NVD: CVE-2018-12591

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-1074

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201806-1074

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006619

PATCH

title:TopPageurl:https://www.ubnt.com/

Trust: 0.8

title:Patch for UbiquitiNetworksEdgeSwitch Code Execution Vulnerability (CNVD-2018-11987)url:https://www.cnvd.org.cn/patchInfo/show/132721

Trust: 0.6

sources: CNVD: CNVD-2018-11987 // JVNDB: JVNDB-2018-006619

EXTERNAL IDS

db:NVDid:CVE-2018-12591

Trust: 3.1

db:HACKERONEid:313245

Trust: 2.5

db:JVNDBid:JVNDB-2018-006619

Trust: 0.8

db:CNNVDid:CNNVD-201806-1074

Trust: 0.7

db:CNVDid:CNVD-2018-11987

Trust: 0.6

db:VULHUBid:VHN-122566

Trust: 0.1

sources: CNVD: CNVD-2018-11987 // VULHUB: VHN-122566 // JVNDB: JVNDB-2018-006619 // CNNVD: CNNVD-201806-1074 // NVD: CVE-2018-12591

REFERENCES

url:https://hackerone.com/reports/313245

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-12591

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12591

Trust: 0.8

sources: CNVD: CNVD-2018-11987 // VULHUB: VHN-122566 // JVNDB: JVNDB-2018-006619 // CNNVD: CNNVD-201806-1074 // NVD: CVE-2018-12591

SOURCES

db:CNVDid:CNVD-2018-11987
db:VULHUBid:VHN-122566
db:JVNDBid:JVNDB-2018-006619
db:CNNVDid:CNNVD-201806-1074
db:NVDid:CVE-2018-12591

LAST UPDATE DATE

2024-11-23T22:48:41.801000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11987date:2018-06-25T00:00:00
db:VULHUBid:VHN-122566date:2018-08-13T00:00:00
db:JVNDBid:JVNDB-2018-006619date:2018-08-28T00:00:00
db:CNNVDid:CNNVD-201806-1074date:2018-06-21T00:00:00
db:NVDid:CVE-2018-12591date:2024-11-21T03:45:30.020

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-11987date:2018-06-25T00:00:00
db:VULHUBid:VHN-122566date:2018-06-20T00:00:00
db:JVNDBid:JVNDB-2018-006619date:2018-08-28T00:00:00
db:CNNVDid:CNNVD-201806-1074date:2018-06-21T00:00:00
db:NVDid:CVE-2018-12591date:2018-06-20T12:29:00.367