ID

VAR-201807-1687


CVE

CVE-2018-8855


TITLE

Echelon SmartServer and i.LON Vulnerabilities related to cryptography

Trust: 0.8

sources: JVNDB: JVNDB-2018-008466

DESCRIPTION

Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices allow unencrypted Web connections by default, and devices can receive configuration and firmware updates by unsecure FTP. Echelon SmartServer and i.LON Contains a cryptographic vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. EchelonSmartServer1 and other products are products of Echelon Corporation of the United States. The EchelonSmartServer1 is a versatile controller that supports building automation control and enterprise energy management. i.LON100 is a web server that is primarily used to configure and monitor LonWorks devices. An information disclosure vulnerability exists in several Echelon products that originated in the program transmitting sensitive information in clear text. An attacker could exploit the vulnerability to replace legacy files and modules with malicious firmware binaries and modules and execute code on the system

Trust: 2.43

sources: NVD: CVE-2018-8855 // JVNDB: JVNDB-2018-008466 // CNVD: CNVD-2018-18306 // IVD: e2f998b0-39ab-11e9-90f9-000c29342cb1 // VULHUB: VHN-138887

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: e2f998b0-39ab-11e9-90f9-000c29342cb1 // CNVD: CNVD-2018-18306

AFFECTED PRODUCTS

vendor:echelonmodel:smartserver 2scope:ltversion:4.11.007

Trust: 1.8

vendor:echelonmodel:i.lon 600scope:eqversion: -

Trust: 1.6

vendor:echelonmodel:i.lon 100scope:eqversion: -

Trust: 1.6

vendor:echelonmodel:smartserver 1scope:eqversion: -

Trust: 1.6

vendor:echelonmodel:i.lon 100scope: - version: -

Trust: 0.8

vendor:echelonmodel:i.lon 600scope: - version: -

Trust: 0.8

vendor:echelonmodel:smartserver 1scope: - version: -

Trust: 0.8

vendor:echelonmodel:smartserverscope:eqversion:1

Trust: 0.6

vendor:echelonmodel:smartserver <releasescope:eqversion:24.11.007

Trust: 0.6

vendor:echelonmodel:i.lonscope:eqversion:100

Trust: 0.6

vendor:echelonmodel:i.lonscope:eqversion:600

Trust: 0.6

vendor:smartserver 1model: - scope:eqversion: -

Trust: 0.2

vendor:smartserver 2model: - scope:eqversion:*

Trust: 0.2

vendor:i lon 100model: - scope:eqversion: -

Trust: 0.2

vendor:i lon 600model: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2f998b0-39ab-11e9-90f9-000c29342cb1 // CNVD: CNVD-2018-18306 // JVNDB: JVNDB-2018-008466 // CNNVD: CNNVD-201807-1794 // NVD: CVE-2018-8855

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-8855
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-8855
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-18306
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201807-1794
value: CRITICAL

Trust: 0.6

IVD: e2f998b0-39ab-11e9-90f9-000c29342cb1
value: CRITICAL

Trust: 0.2

VULHUB: VHN-138887
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-8855
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-18306
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f998b0-39ab-11e9-90f9-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-138887
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-8855
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2f998b0-39ab-11e9-90f9-000c29342cb1 // CNVD: CNVD-2018-18306 // VULHUB: VHN-138887 // JVNDB: JVNDB-2018-008466 // CNNVD: CNNVD-201807-1794 // NVD: CVE-2018-8855

PROBLEMTYPE DATA

problemtype:CWE-319

Trust: 1.1

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-138887 // JVNDB: JVNDB-2018-008466 // NVD: CVE-2018-8855

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-1794

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201807-1794

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-008466

PATCH

title:Top Pageurl:https://www.echelon.com/

Trust: 0.8

title:Patches for multiple Echelon Product Information Disclosure Vulnerabilities (CNVD-2018-18306)url:https://www.cnvd.org.cn/patchInfo/show/139839

Trust: 0.6

title:Multiple Echelon Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82588

Trust: 0.6

sources: CNVD: CNVD-2018-18306 // JVNDB: JVNDB-2018-008466 // CNNVD: CNNVD-201807-1794

EXTERNAL IDS

db:NVDid:CVE-2018-8855

Trust: 3.3

db:ICS CERTid:ICSA-18-200-03

Trust: 3.1

db:CNNVDid:CNNVD-201807-1794

Trust: 0.9

db:CNVDid:CNVD-2018-18306

Trust: 0.8

db:JVNDBid:JVNDB-2018-008466

Trust: 0.8

db:IVDid:E2F998B0-39AB-11E9-90F9-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-138887

Trust: 0.1

sources: IVD: e2f998b0-39ab-11e9-90f9-000c29342cb1 // CNVD: CNVD-2018-18306 // VULHUB: VHN-138887 // JVNDB: JVNDB-2018-008466 // CNNVD: CNNVD-201807-1794 // NVD: CVE-2018-8855

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-200-03

Trust: 3.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8855

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-8855

Trust: 0.8

sources: CNVD: CNVD-2018-18306 // VULHUB: VHN-138887 // JVNDB: JVNDB-2018-008466 // CNNVD: CNNVD-201807-1794 // NVD: CVE-2018-8855

SOURCES

db:IVDid:e2f998b0-39ab-11e9-90f9-000c29342cb1
db:CNVDid:CNVD-2018-18306
db:VULHUBid:VHN-138887
db:JVNDBid:JVNDB-2018-008466
db:CNNVDid:CNNVD-201807-1794
db:NVDid:CVE-2018-8855

LAST UPDATE DATE

2024-11-23T22:00:27.827000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-18306date:2018-09-12T00:00:00
db:VULHUBid:VHN-138887date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2018-008466date:2018-10-18T00:00:00
db:CNNVDid:CNNVD-201807-1794date:2019-10-17T00:00:00
db:NVDid:CVE-2018-8855date:2024-11-21T04:14:27.677

SOURCES RELEASE DATE

db:IVDid:e2f998b0-39ab-11e9-90f9-000c29342cb1date:2018-09-11T00:00:00
db:CNVDid:CNVD-2018-18306date:2018-09-10T00:00:00
db:VULHUBid:VHN-138887date:2018-07-24T00:00:00
db:JVNDBid:JVNDB-2018-008466date:2018-10-18T00:00:00
db:CNNVDid:CNNVD-201807-1794date:2018-07-25T00:00:00
db:NVDid:CVE-2018-8855date:2018-07-24T17:29:00.400