ID

VAR-201812-0089


CVE

CVE-2018-0468


TITLE

Cisco Energy Management Suite Vulnerabilities related to the use of hard-coded credentials

Trust: 0.8

sources: JVNDB: JVNDB-2018-012741

DESCRIPTION

A vulnerability in the configuration of a local database installed as part of the Cisco Energy Management Suite (CEMS) could allow an authenticated, local attacker to access and alter confidential data. The vulnerability is due to the installation of the PostgreSQL database with unchanged default access credentials. An attacker could exploit this vulnerability by logging in to the machine where CEMS is installed and establishing a local connection to the database. The fix for this vulnerability randomizes the database access password in new installations; however, the fix will not change the password for existing installations. Users are required to manually change the password, as documented in the Workarounds section of this advisory. There are workarounds that address this vulnerability. Cisco Energy Management Suite is prone to an access-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Cisco Energy Management Suite 5.2 version is vulnerable. This issue is tracked by Cisco Bug ID CSCvm09173. This product is mainly used to manage energy management of network equipment, etc

Trust: 1.98

sources: NVD: CVE-2018-0468 // JVNDB: JVNDB-2018-012741 // BID: 106124 // VULHUB: VHN-118670

AFFECTED PRODUCTS

vendor:ciscomodel:energy management suitescope:eqversion:5.2

Trust: 1.9

vendor:ciscomodel:energy management suite softwarescope: - version: -

Trust: 0.8

sources: BID: 106124 // JVNDB: JVNDB-2018-012741 // CNNVD: CNNVD-201812-123 // NVD: CVE-2018-0468

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0468
value: HIGH

Trust: 1.0

NVD: CVE-2018-0468
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201812-123
value: HIGH

Trust: 0.6

VULHUB: VHN-118670
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-0468
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118670
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0468
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-118670 // JVNDB: JVNDB-2018-012741 // CNNVD: CNNVD-201812-123 // NVD: CVE-2018-0468

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-118670 // JVNDB: JVNDB-2018-012741 // NVD: CVE-2018-0468

THREAT TYPE

local

Trust: 0.9

sources: BID: 106124 // CNNVD: CNNVD-201812-123

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201812-123

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-012741

PATCH

title:cisco-sa-20181204-ems-sql-passwrdurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181204-ems-sql-passwrd

Trust: 0.8

title:Cisco Energy Management Suite Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87419

Trust: 0.6

sources: JVNDB: JVNDB-2018-012741 // CNNVD: CNNVD-201812-123

EXTERNAL IDS

db:NVDid:CVE-2018-0468

Trust: 2.8

db:BIDid:106124

Trust: 1.4

db:TENABLEid:TRA-2018-42

Trust: 1.1

db:JVNDBid:JVNDB-2018-012741

Trust: 0.8

db:CNNVDid:CNNVD-201812-123

Trust: 0.7

db:SEEBUGid:SSVID-97740

Trust: 0.1

db:VULHUBid:VHN-118670

Trust: 0.1

sources: VULHUB: VHN-118670 // BID: 106124 // JVNDB: JVNDB-2018-012741 // CNNVD: CNNVD-201812-123 // NVD: CVE-2018-0468

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181204-ems-sql-passwrd

Trust: 2.0

url:http://www.securityfocus.com/bid/106124

Trust: 1.1

url:https://www.tenable.com/security/research/tra-2018-42

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0468

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0468

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-118670 // BID: 106124 // JVNDB: JVNDB-2018-012741 // CNNVD: CNNVD-201812-123 // NVD: CVE-2018-0468

CREDITS

Cisco would like to thank Chris Lyne from Tenable for reporting this vulnerability.

Trust: 0.6

sources: CNNVD: CNNVD-201812-123

SOURCES

db:VULHUBid:VHN-118670
db:BIDid:106124
db:JVNDBid:JVNDB-2018-012741
db:CNNVDid:CNNVD-201812-123
db:NVDid:CVE-2018-0468

LAST UPDATE DATE

2024-11-23T22:12:12.804000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118670date:2019-01-02T00:00:00
db:BIDid:106124date:2018-12-04T00:00:00
db:JVNDBid:JVNDB-2018-012741date:2019-02-07T00:00:00
db:CNNVDid:CNNVD-201812-123date:2019-02-21T00:00:00
db:NVDid:CVE-2018-0468date:2024-11-21T03:38:17.777

SOURCES RELEASE DATE

db:VULHUBid:VHN-118670date:2018-12-04T00:00:00
db:BIDid:106124date:2018-12-04T00:00:00
db:JVNDBid:JVNDB-2018-012741date:2019-02-07T00:00:00
db:CNNVDid:CNNVD-201812-123date:2018-12-05T00:00:00
db:NVDid:CVE-2018-0468date:2018-12-04T18:29:00.280