ID

VAR-201904-1487


CVE

CVE-2018-5757


TITLE

AudioCodes 450HD IP Phone In device firmware OS Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-015197

DESCRIPTION

An issue was discovered on AudioCodes 450HD IP Phone devices with firmware 3.0.0.535.106. The traceroute and ping functionality, which uses a parameter in a request to command.cgi from the Monitoring page in the web UI, unsafely puts user-alterable data directly into an OS command, leading to Remote Code Execution via shell metacharacters in the query string. AudioCodes 450HD IP Phone Device firmware includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The vulnerability stems from the fact that the network system or product does not correctly filter special characters, commands, etc. in the process of constructing executable commands of the operating system from external input data. Attackers can exploit this vulnerability to execute illegal operating system commands

Trust: 1.8

sources: NVD: CVE-2018-5757 // JVNDB: JVNDB-2018-015197 // VULHUB: VHN-135789 // VULMON: CVE-2018-5757

AFFECTED PRODUCTS

vendor:audiocodesmodel:420hd ip phonescope:eqversion:3.0.0.535.106

Trust: 1.8

sources: JVNDB: JVNDB-2018-015197 // NVD: CVE-2018-5757

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5757
value: HIGH

Trust: 1.0

NVD: CVE-2018-5757
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201904-025
value: HIGH

Trust: 0.6

VULHUB: VHN-135789
value: HIGH

Trust: 0.1

VULMON: CVE-2018-5757
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-5757
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-135789
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5757
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-135789 // VULMON: CVE-2018-5757 // JVNDB: JVNDB-2018-015197 // CNNVD: CNNVD-201904-025 // NVD: CVE-2018-5757

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-135789 // JVNDB: JVNDB-2018-015197 // NVD: CVE-2018-5757

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201904-025

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201904-025

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015197

PATCH

title:420HD IP Phoneurl:https://www.audiocodes.com/solutions-products/products/ip-phones/420hd-ip-phone

Trust: 0.8

title:CVE-Collectionurl:https://github.com/nattimmis/CVE-Collection

Trust: 0.1

title:CVEsurl:https://github.com/RhinoSecurityLabs/CVEs

Trust: 0.1

title:AWS-CVEsurl:https://github.com/sunzu94/AWS-CVEs

Trust: 0.1

sources: VULMON: CVE-2018-5757 // JVNDB: JVNDB-2018-015197

EXTERNAL IDS

db:NVDid:CVE-2018-5757

Trust: 2.6

db:JVNDBid:JVNDB-2018-015197

Trust: 0.8

db:CNNVDid:CNNVD-201904-025

Trust: 0.7

db:VULHUBid:VHN-135789

Trust: 0.1

db:VULMONid:CVE-2018-5757

Trust: 0.1

sources: VULHUB: VHN-135789 // VULMON: CVE-2018-5757 // JVNDB: JVNDB-2018-015197 // CNNVD: CNNVD-201904-025 // NVD: CVE-2018-5757

REFERENCES

url:https://github.com/rhinosecuritylabs/cves/tree/master/cve-2018-5757

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-5757

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5757

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/nattimmis/cve-collection

Trust: 0.1

url:https://github.com/rhinosecuritylabs/cves

Trust: 0.1

sources: VULHUB: VHN-135789 // VULMON: CVE-2018-5757 // JVNDB: JVNDB-2018-015197 // CNNVD: CNNVD-201904-025 // NVD: CVE-2018-5757

SOURCES

db:VULHUBid:VHN-135789
db:VULMONid:CVE-2018-5757
db:JVNDBid:JVNDB-2018-015197
db:CNNVDid:CNNVD-201904-025
db:NVDid:CVE-2018-5757

LAST UPDATE DATE

2024-11-23T22:51:49.354000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-135789date:2019-04-04T00:00:00
db:VULMONid:CVE-2018-5757date:2019-04-04T00:00:00
db:JVNDBid:JVNDB-2018-015197date:2019-05-10T00:00:00
db:CNNVDid:CNNVD-201904-025date:2019-07-25T00:00:00
db:NVDid:CVE-2018-5757date:2024-11-21T04:09:20.147

SOURCES RELEASE DATE

db:VULHUBid:VHN-135789date:2019-04-01T00:00:00
db:VULMONid:CVE-2018-5757date:2019-04-01T00:00:00
db:JVNDBid:JVNDB-2018-015197date:2019-05-10T00:00:00
db:CNNVDid:CNNVD-201904-025date:2019-04-01T00:00:00
db:NVDid:CVE-2018-5757date:2019-04-01T17:29:00.323