ID

VAR-201903-0362


CVE

CVE-2019-3918


TITLE

Alcatel Lucent I-240W-Q GPON ONT Vulnerabilities related to the use of hard-coded credentials in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2019-002213

DESCRIPTION

The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 contains multiple hard coded credentials for the Telnet and SSH interfaces. Alcatel Lucent I-240W-Q GPON ONT Firmware contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GPON (Gigabit-CapablePON) technology is the latest generation of broadband passive optical integrated access standard based on ITU-TG.984.x standard. It has many advantages such as high bandwidth, high efficiency, large coverage, rich user interface, etc. Operators are regarded as the ideal technology to realize broadband and integrated transformation of access network services. GPONHomeGateway is a router provided by ISPs for users. A GPON router has a hard-coded vulnerabilities vulnerability that an attacker can use to obtain a login account password. Nokia Alcatel Lucent I-240W-Q GPON ONT is an optical network interruption device of Nokia Corporation of Finland. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements

Trust: 2.34

sources: NVD: CVE-2019-3918 // JVNDB: JVNDB-2019-002213 // CNVD: CNVD-2019-06039 // VULHUB: VHN-155353 // VULMON: CVE-2019-3918

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-06039

AFFECTED PRODUCTS

vendor:nokiamodel:i-240w-q gpon ontscope:eqversion:3fe54567bozj19

Trust: 1.8

vendor:dasanmodel:networks gpon home gatewayscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-06039 // JVNDB: JVNDB-2019-002213 // NVD: CVE-2019-3918

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-3918
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-3918
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-06039
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201903-078
value: CRITICAL

Trust: 0.6

VULHUB: VHN-155353
value: HIGH

Trust: 0.1

VULMON: CVE-2019-3918
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-3918
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-06039
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-155353
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-3918
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-3918
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-06039 // VULHUB: VHN-155353 // VULMON: CVE-2019-3918 // JVNDB: JVNDB-2019-002213 // CNNVD: CNNVD-201903-078 // NVD: CVE-2019-3918

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-155353 // JVNDB: JVNDB-2019-002213 // NVD: CVE-2019-3918

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201903-078

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201903-078

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002213

PATCH

title:Top Pageurl:https://www.nokia.com/

Trust: 0.8

sources: JVNDB: JVNDB-2019-002213

EXTERNAL IDS

db:NVDid:CVE-2019-3918

Trust: 3.2

db:TENABLEid:TRA-2019-09

Trust: 2.6

db:JVNDBid:JVNDB-2019-002213

Trust: 0.8

db:CNNVDid:CNNVD-201903-078

Trust: 0.7

db:SEEBUGid:SSVID-978

Trust: 0.6

db:CNVDid:CNVD-2019-06039

Trust: 0.6

db:VULHUBid:VHN-155353

Trust: 0.1

db:VULMONid:CVE-2019-3918

Trust: 0.1

sources: CNVD: CNVD-2019-06039 // VULHUB: VHN-155353 // VULMON: CVE-2019-3918 // JVNDB: JVNDB-2019-002213 // CNNVD: CNNVD-201903-078 // NVD: CVE-2019-3918

REFERENCES

url:https://www.tenable.com/security/research/tra-2019-09

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-3918

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3918

Trust: 0.8

url:https://www.seebug.org/vuldb/ssvid-978

Trust: 0.6

url:https://www.zoomeye.org/searchresult?q=%22gpon%20home%20gateway%

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-06039 // VULHUB: VHN-155353 // VULMON: CVE-2019-3918 // JVNDB: JVNDB-2019-002213 // CNNVD: CNNVD-201903-078 // NVD: CVE-2019-3918

SOURCES

db:CNVDid:CNVD-2019-06039
db:VULHUBid:VHN-155353
db:VULMONid:CVE-2019-3918
db:JVNDBid:JVNDB-2019-002213
db:CNNVDid:CNNVD-201903-078
db:NVDid:CVE-2019-3918

LAST UPDATE DATE

2024-11-23T21:37:36.477000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-06039date:2019-04-25T00:00:00
db:VULHUBid:VHN-155353date:2022-12-03T00:00:00
db:VULMONid:CVE-2019-3918date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2019-002213date:2019-04-04T00:00:00
db:CNNVDid:CNNVD-201903-078date:2019-10-10T00:00:00
db:NVDid:CVE-2019-3918date:2024-11-21T04:42:51.717

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-06039date:2019-03-04T00:00:00
db:VULHUBid:VHN-155353date:2019-03-05T00:00:00
db:VULMONid:CVE-2019-3918date:2019-03-05T00:00:00
db:JVNDBid:JVNDB-2019-002213date:2019-04-04T00:00:00
db:CNNVDid:CNNVD-201903-078date:2019-03-05T00:00:00
db:NVDid:CVE-2019-3918date:2019-03-05T21:29:00.320