René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

128 lines
4.2 KiB
JSON

{
"id": "CVE-2018-0377",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2018-07-18T23:29:00.900",
"lastModified": "2019-10-09T23:31:55.163",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Open Systems Gateway initiative (OSGi) interface of Cisco Policy Suite before 18.1.0 could allow an unauthenticated, remote attacker to directly connect to the OSGi interface. The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by directly connecting to the OSGi interface. An exploit could allow the attacker to access or change any files that are accessible by the OSGi process. Cisco Bug IDs: CSCvh18017."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la la interfaz Open Systems Gateway initiative (OSGi) de Cisco Policy Suite en versiones anteriores a la 18.1.0 podr\u00eda permitir que un atacante remoto no autenticado se conecte directamente a la interfaz OSGi. Esta vulnerabilidad se debe a la ausencia de autenticaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad conect\u00e1ndose directamente a la interfaz OSGi. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante acceda o cambie cualquier archivo accesible por el proceso OSGi. Cisco Bug IDs: CSCvh18017."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:mobility_services_engine:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50D51DA6-4C87-481F-B9D5-77E315FD4D7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:policy_suite:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.1.0",
"matchCriteriaId": "ADB0B8A2-E8E3-4ADB-A549-5297B6D2D0BD"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/104850",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-ps-osgi-unauth-access",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}