Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-18556 | First vendor Publication | 2018-12-17 |
Vendor | Cve | Last vendor Modification | 2023-01-20 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.9 | ||
Base Score | 9.9 | Environmental Score | 9.9 |
impact SubScore | 6 | Temporal Score | 9.9 |
Exploitabality Sub Score | 3.1 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Changed | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A privilege escalation issue was discovered in VyOS 1.1.8. The default configuration also allows operator users to execute the pppd binary with elevated (sudo) permissions. Certain input parameters are not properly validated. A malicious operator user can run the binary with elevated permissions and leverage its improper input validation condition to spawn an attacker-controlled shell with root privileges. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18556 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 |
Metasploit Database
id | Description |
---|---|
2018-11-05 | VyOS restricted-shell Escape and Privilege Escalation |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2023-01-20 21:27:35 |
|
2021-05-04 13:13:02 |
|
2021-04-22 02:27:31 |
|
2020-09-21 21:23:10 |
|
2020-09-19 17:22:39 |
|
2020-05-23 01:11:38 |
|
2019-10-03 09:21:02 |
|
2019-02-06 21:19:15 |
|
2018-12-18 00:19:13 |
|