Executive Summary
Summary | |
---|---|
Title | TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks |
Informations | |||
---|---|---|---|
Name | VU#581311 | First vendor Publication | 2018-09-26 |
Vendor | VU-CERT | Last vendor Modification | 2018-10-26 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#581311TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacksOverviewThe TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. EAP Controller for Linux lacks user authentication for RMI service commands, as well as utilizes an outdated vulnerable version of Apache commons-collections, which may allow an attacker to implement deserialization attacks and control the EAP Controller server. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to Liu Zhu, of Huawei Weiran Lab for reporting this vulnerability. This document was written by Garret Wassermann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/581311 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-502 | Deserialization of Untrusted Data |
50 % | CWE-306 | Missing Authentication for Critical Function (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-05-02 | Name : A network management system running on the remote host is affected by a remot... File : cisco_prime_lms_java_deser.nasl - Type : ACT_ATTACK |
2017-05-02 | Name : A web application running on the remote host is affected by a remote code exe... File : cisco_security_java_deser.nasl - Type : ACT_ATTACK |
2016-10-10 | Name : The remote device is affected by a remote code execution vulnerability. File : cisco_cucm_CSCux34835.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2019-01-08 00:21:30 |
|
2018-10-27 00:18:28 |
|
2018-10-26 21:19:47 |
|
2018-10-16 21:18:35 |
|
2018-09-28 21:21:44 |
|
2018-09-26 17:18:39 |
|