ID

VAR-201812-0038


CVE

CVE-2018-15774


TITLE

plural Dell iDRAC Vulnerabilities related to authorization, authority, and access control in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-014040

DESCRIPTION

Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 and iDRAC9 versions prior to 3.20.21.20, 3.21.24.22, 3.21.26.22, and 3.23.23.23 contain a privilege escalation vulnerability. An authenticated malicious iDRAC user with operator privileges could potentially exploit a permissions check flaw in the Redfish interface to gain administrator access. Dell EMC iDRAC7 , iDRAC8 , iDRAC9 Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dell EMC iDRAC is prone to the following security vulnerabilities: 1. A privilege-escalation vulnerability 2. Dell EMC iDRAC7, iDRAC8 and iDRAC9 are all system management solutions of Dell (Dell) including hardware and software. This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems

Trust: 2.16

sources: NVD: CVE-2018-15774 // JVNDB: JVNDB-2018-014040 // BID: 106233 // VULHUB: VHN-126067 // VULHUB: VHN-126069 // VULMON: CVE-2018-15774

AFFECTED PRODUCTS

vendor:dellmodel:idrac7scope:ltversion:2.61.60.60

Trust: 1.8

vendor:dellmodel:idrac8scope:ltversion:2.61.60.60

Trust: 1.8

vendor:dellmodel:idrac9scope:ltversion:3.20.21.20

Trust: 1.8

vendor:dellmodel:idrac9scope:ltversion:3.21.24.22

Trust: 1.8

vendor:dellmodel:idrac9scope:gteversion:3.21.21.21

Trust: 1.0

vendor:dellmodel:idrac9scope:ltversion:3.21.26.22

Trust: 0.8

vendor:dellmodel:idrac9scope:ltversion:3.23.23.23

Trust: 0.8

vendor:dellmodel:idrac9scope:eqversion:3.20.20.20

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.19.19.19

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.18.18.18

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.17.20.17

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.17.18.17

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.17.17.17

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.16.16.16

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.15.19.15

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.15.17.15

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.15.15.15

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.11.11.11

Trust: 0.3

vendor:dellmodel:idrac9scope:eqversion:3.00.00.00

Trust: 0.3

vendor:dellmodel:idrac8scope:eqversion:0

Trust: 0.3

vendor:dellmodel:idrac7scope:eqversion:0

Trust: 0.3

vendor:dellmodel:idrac6scope:eqversion:0

Trust: 0.3

vendor:dellmodel:idrac9scope:neversion:3.23.23.23

Trust: 0.3

vendor:dellmodel:idrac9scope:neversion:3.21.26.22

Trust: 0.3

vendor:dellmodel:idrac9scope:neversion:3.21.24.22

Trust: 0.3

vendor:dellmodel:idrac9scope:neversion:3.20.21.20

Trust: 0.3

vendor:dellmodel:idrac8scope:neversion:2.61.60.60

Trust: 0.3

vendor:dellmodel:idrac7scope:neversion:2.61.60.60

Trust: 0.3

sources: BID: 106233 // JVNDB: JVNDB-2018-014040 // NVD: CVE-2018-15774

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15774
value: HIGH

Trust: 1.0

security_alert@emc.com: CVE-2018-15774
value: LOW

Trust: 1.0

NVD: CVE-2018-15774
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201812-674
value: HIGH

Trust: 0.6

VULHUB: VHN-126067
value: MEDIUM

Trust: 0.1

VULHUB: VHN-126069
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-15774
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-15774
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-126067
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

VULHUB: VHN-126069
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15774
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

security_alert@emc.com: CVE-2018-15774
baseSeverity: LOW
baseScore: 3.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.2
impactScore: 2.5
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-126067 // VULHUB: VHN-126069 // VULMON: CVE-2018-15774 // JVNDB: JVNDB-2018-014040 // CNNVD: CNNVD-201812-674 // NVD: CVE-2018-15774 // NVD: CVE-2018-15774

PROBLEMTYPE DATA

problemtype:CWE-863

Trust: 1.1

problemtype:CWE-264

Trust: 0.9

problemtype:CWE-388

Trust: 0.1

sources: VULHUB: VHN-126067 // VULHUB: VHN-126069 // JVNDB: JVNDB-2018-014040 // NVD: CVE-2018-15774

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201812-674

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201812-674

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014040

PATCH

title:Dell EMC iDRAC の複数の脆弱性 (cve-2018-15774 および cve-2018-15776)url:https://www.dell.com/support/article/jp/ja/jpdhs1/sln315190/dell-emc-idrac-の複数の脆弱性-cve-2018-15774-および-cve-2018-15776?lang=ja

Trust: 0.8

title:Dell EMC iDRAC Multiple Vulnerabilities (CVE-2018-15774 and CVE-2018-15776)url:https://www.dell.com/support/article/jp/ja/jpdhs1/sln315190/dell-emc-idrac-multiple-vulnerabilities-cve-2018-15774-and-cve-2018-15776?lang=en

Trust: 0.8

title:Dell EMC iDRAC7 , iDRAC8 and iDRAC9 Fixes for permission permissions and access control vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87909

Trust: 0.6

title:reverse-engineering-dell-idrac-to-get-rid-of-gpu-throttlingurl:https://github.com/l4rz/reverse-engineering-dell-idrac-to-get-rid-of-gpu-throttling

Trust: 0.1

title: - url:https://github.com/chnzzh/iDRAC-CVE-lib

Trust: 0.1

sources: VULMON: CVE-2018-15774 // JVNDB: JVNDB-2018-014040 // CNNVD: CNNVD-201812-674

EXTERNAL IDS

db:NVDid:CVE-2018-15774

Trust: 3.0

db:BIDid:106233

Trust: 3.0

db:JVNDBid:JVNDB-2018-014040

Trust: 0.8

db:CNNVDid:CNNVD-201812-674

Trust: 0.7

db:CNVDid:CNVD-2020-15727

Trust: 0.1

db:VULHUBid:VHN-126067

Trust: 0.1

db:CNNVDid:CNNVD-201812-673

Trust: 0.1

db:CNVDid:CNVD-2020-15728

Trust: 0.1

db:VULHUBid:VHN-126069

Trust: 0.1

db:VULMONid:CVE-2018-15774

Trust: 0.1

sources: VULHUB: VHN-126067 // VULHUB: VHN-126069 // VULMON: CVE-2018-15774 // BID: 106233 // JVNDB: JVNDB-2018-014040 // CNNVD: CNNVD-201812-674 // NVD: CVE-2018-15774

REFERENCES

url:http://www.securityfocus.com/bid/106233

Trust: 2.8

url:https://www.dell.com/support/article/us/en/19/sln315190/dell-emc-idrac-multiple-vulnerabilities-cve-2018-15774-and-cve-2018-15776-?lang=en

Trust: 2.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15774

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15774

Trust: 0.8

url:https://www.dellemc.com/en-us/index.htm

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/863.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/l4rz/reverse-engineering-dell-idrac-to-get-rid-of-gpu-throttling

Trust: 0.1

sources: VULHUB: VHN-126067 // VULHUB: VHN-126069 // VULMON: CVE-2018-15774 // BID: 106233 // JVNDB: JVNDB-2018-014040 // CNNVD: CNNVD-201812-674 // NVD: CVE-2018-15774

CREDITS

Jon Sands and Adam Nielsen

Trust: 0.3

sources: BID: 106233

SOURCES

db:VULHUBid:VHN-126067
db:VULHUBid:VHN-126069
db:VULMONid:CVE-2018-15774
db:BIDid:106233
db:JVNDBid:JVNDB-2018-014040
db:CNNVDid:CNNVD-201812-674
db:NVDid:CVE-2018-15774

LAST UPDATE DATE

2024-11-23T22:51:54.097000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-126067date:2019-10-09T00:00:00
db:VULHUBid:VHN-126069date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-15774date:2019-10-09T00:00:00
db:BIDid:106233date:2018-12-13T00:00:00
db:JVNDBid:JVNDB-2018-014040date:2019-03-11T00:00:00
db:CNNVDid:CNNVD-201812-674date:2019-10-17T00:00:00
db:NVDid:CVE-2018-15774date:2024-11-21T03:51:26.783

SOURCES RELEASE DATE

db:VULHUBid:VHN-126067date:2018-12-13T00:00:00
db:VULHUBid:VHN-126069date:2018-12-13T00:00:00
db:VULMONid:CVE-2018-15774date:2018-12-13T00:00:00
db:BIDid:106233date:2018-12-13T00:00:00
db:JVNDBid:JVNDB-2018-014040date:2019-03-11T00:00:00
db:CNNVDid:CNNVD-201812-674date:2018-12-14T00:00:00
db:NVDid:CVE-2018-15774date:2018-12-13T22:29:00.327