ID

VAR-201812-1157


CVE

CVE-2018-20577


TITLE

Orange Livebox Cross-Site Request Forgery Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2019-03336 // CNNVD: CNNVD-201812-1243

DESCRIPTION

Orange Livebox 00.96.320S devices allow cgi-bin/restore.exe, cgi-bin/firewall_SPI.exe, cgi-bin/setup_remote_mgmt.exe, cgi-bin/setup_pass.exe, and cgi-bin/upgradep.exe CSRF. This is related to Firmware 01.11.2017-11:43:44, Boot v0.70.03, Modem 5.4.1.10.1.1A, Hardware 02, and Arcadyan ARV7519RW22-A-L T VR9 1.2. Orange Livebox Contains a cross-site request forgery vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. The OrangeLivebox is an ADSL (Asymmetric Digital Subscriber Line) modem. A cross-site request forgery vulnerability exists in multiple files in the OrangeLivebox00.96.320S version (Firmware00.96.320S version, Bootv0.70.03 version, Modem5.4.1.10.1.1A version, Hardware02 version, and ArcadyanARV7519RW22-A-LTVR91.2 version). A remote attacker can exploit this vulnerability to tamper with all configuration parameters. (Multiple files include: cgi-bin/restore.exe, cgi-bin/firewall_SPI.exe, cgi-bin/setup_remote_mgmt.exe, cgi-bin/setup_pass.exe and cgi-bin/upgradep.exe files)

Trust: 2.25

sources: NVD: CVE-2018-20577 // JVNDB: JVNDB-2018-013637 // CNVD: CNVD-2019-03336 // VULHUB: VHN-131397

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-03336

AFFECTED PRODUCTS

vendor:orangemodel:arv7519rw22 livebox 2.1scope:eqversion:00.96.320s

Trust: 1.0

vendor:orangemodel:liveboxscope: - version: -

Trust: 0.8

vendor:liveboxmodel:00.96.320sscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-03336 // JVNDB: JVNDB-2018-013637 // NVD: CVE-2018-20577

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-20577
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-20577
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-03336
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201812-1243
value: CRITICAL

Trust: 0.6

VULHUB: VHN-131397
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-20577
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-03336
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-131397
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-20577
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-03336 // VULHUB: VHN-131397 // JVNDB: JVNDB-2018-013637 // CNNVD: CNNVD-201812-1243 // NVD: CVE-2018-20577

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-131397 // JVNDB: JVNDB-2018-013637 // NVD: CVE-2018-20577

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201812-1243

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201812-1243

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013637

PATCH

title:Top Pageurl:https://www.orange.com/en/home

Trust: 0.8

sources: JVNDB: JVNDB-2018-013637

EXTERNAL IDS

db:NVDid:CVE-2018-20577

Trust: 3.1

db:JVNDBid:JVNDB-2018-013637

Trust: 0.8

db:CNNVDid:CNNVD-201812-1243

Trust: 0.7

db:CNVDid:CNVD-2019-03336

Trust: 0.6

db:VULHUBid:VHN-131397

Trust: 0.1

sources: CNVD: CNVD-2019-03336 // VULHUB: VHN-131397 // JVNDB: JVNDB-2018-013637 // CNNVD: CNNVD-201812-1243 // NVD: CVE-2018-20577

REFERENCES

url:https://github.com/zadewg/livebox-0day

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-20577

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-20577

Trust: 0.8

sources: CNVD: CNVD-2019-03336 // VULHUB: VHN-131397 // JVNDB: JVNDB-2018-013637 // CNNVD: CNNVD-201812-1243 // NVD: CVE-2018-20577

SOURCES

db:CNVDid:CNVD-2019-03336
db:VULHUBid:VHN-131397
db:JVNDBid:JVNDB-2018-013637
db:CNNVDid:CNNVD-201812-1243
db:NVDid:CVE-2018-20577

LAST UPDATE DATE

2024-11-23T21:52:36.830000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-03336date:2019-01-30T00:00:00
db:VULHUBid:VHN-131397date:2019-01-22T00:00:00
db:JVNDBid:JVNDB-2018-013637date:2019-02-27T00:00:00
db:CNNVDid:CNNVD-201812-1243date:2019-02-11T00:00:00
db:NVDid:CVE-2018-20577date:2024-11-21T04:01:46.270

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-03336date:2019-01-30T00:00:00
db:VULHUBid:VHN-131397date:2018-12-28T00:00:00
db:JVNDBid:JVNDB-2018-013637date:2019-02-27T00:00:00
db:CNNVDid:CNNVD-201812-1243date:2018-12-29T00:00:00
db:NVDid:CVE-2018-20577date:2018-12-28T17:29:00.917