ID

VAR-201910-1511


CVE

CVE-2018-4002


TITLE

CUJO Smart Firewall Vulnerability in recursive control

Trust: 0.8

sources: JVNDB: JVNDB-2018-016140

DESCRIPTION

An exploitable denial-of-service vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. When parsing labels in mDNS packets, the firewall unsafely handles label compression pointers, leading to an uncontrolled recursion that eventually exhausts the stack, crashing the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability. CUJOSmartFirewall is a home smart firewall device from CUJO. This vulnerability stems from the failure of the program to safely process compressed pointers when parsing tags in mDNS packets

Trust: 2.16

sources: NVD: CVE-2018-4002 // JVNDB: JVNDB-2018-016140 // CNVD: CNVD-2019-07794

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-07794

AFFECTED PRODUCTS

vendor:cujomodel:smart firewallscope:eqversion:7003

Trust: 1.6

vendor:cujo aimodel:smart firewallscope:eqversion:7003

Trust: 0.8

sources: CNVD: CNVD-2019-07794 // JVNDB: JVNDB-2018-016140 // NVD: CVE-2018-4002

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4002
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2018-4002
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-4002
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-07794
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201903-661
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2018-4002
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-07794
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-4002
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2018-4002
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: CVE-2018-4002
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-07794 // JVNDB: JVNDB-2018-016140 // CNNVD: CNNVD-201903-661 // NVD: CVE-2018-4002 // NVD: CVE-2018-4002

PROBLEMTYPE DATA

problemtype:CWE-674

Trust: 1.8

sources: JVNDB: JVNDB-2018-016140 // NVD: CVE-2018-4002

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201903-661

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201903-661

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-016140

PATCH

title:Top Pageurl:https://cujo.com/

Trust: 0.8

sources: JVNDB: JVNDB-2018-016140

EXTERNAL IDS

db:NVDid:CVE-2018-4002

Trust: 3.0

db:TALOSid:TALOS-2018-0671

Trust: 3.0

db:JVNDBid:JVNDB-2018-016140

Trust: 0.8

db:CNVDid:CNVD-2019-07794

Trust: 0.6

db:NSFOCUSid:43009

Trust: 0.6

db:CNNVDid:CNNVD-201903-661

Trust: 0.6

sources: CNVD: CNVD-2019-07794 // JVNDB: JVNDB-2018-016140 // CNNVD: CNNVD-201903-661 // NVD: CVE-2018-4002

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2018-0671

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-4002

Trust: 1.4

url:https://www.talosintelligence.com/vulnerability_reports/talos-2018-0671

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4002

Trust: 0.8

url:http://www.nsfocus.net/vulndb/43009

Trust: 0.6

sources: CNVD: CNVD-2019-07794 // JVNDB: JVNDB-2018-016140 // CNNVD: CNNVD-201903-661 // NVD: CVE-2018-4002

CREDITS

Discovered by Claudio Bozzato of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-201903-661

SOURCES

db:CNVDid:CNVD-2019-07794
db:JVNDBid:JVNDB-2018-016140
db:CNNVDid:CNNVD-201903-661
db:NVDid:CVE-2018-4002

LAST UPDATE DATE

2024-11-23T22:58:29.502000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-07794date:2019-03-22T00:00:00
db:JVNDBid:JVNDB-2018-016140date:2019-11-12T00:00:00
db:CNNVDid:CNNVD-201903-661date:2022-04-20T00:00:00
db:NVDid:CVE-2018-4002date:2024-11-21T04:06:28.443

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-07794date:2019-03-22T00:00:00
db:JVNDBid:JVNDB-2018-016140date:2019-11-12T00:00:00
db:CNNVDid:CNNVD-201903-661date:2019-03-19T00:00:00
db:NVDid:CVE-2018-4002date:2019-10-31T21:15:12.277