Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-4018 | First vendor Publication | 2019-05-13 |
Vendor | Cve | Last vendor Modification | 2022-06-07 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.8 | ||
Base Score | 9.8 | Environmental Score | 9.8 |
impact SubScore | 5.9 | Temporal Score | 9.8 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
An exploitable firmware update vulnerability exists in the NT9665X Chipset firmware, running on Anker Roav A1 Dashcam version RoavA1SWV1.9. The HTTP server allows for arbitrary firmware binaries to be uploaded which will be flashed upon next reboot. An attacker can send an HTTP PUT request or upgrade firmware request to trigger this vulnerability. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4018 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | TRUFFLEHUNTER TALOS-2018-0689 attack attempt RuleID : 48069 - Revision : 1 - Type : SERVER-WEBAPP |
Sources (Detail)
Source | Url |
---|---|
MISC | https://talosintelligence.com/vulnerability_reports/TALOS-2018-0689 |
Alert History
Date | Informations |
---|---|
2022-06-07 21:27:25 |
|
2022-04-20 00:23:28 |
|
2020-12-05 21:23:47 |
|
2020-05-23 01:13:43 |
|
2019-05-16 21:19:31 |
|
2019-05-13 21:19:24 |
|