Skip to content
This repository was archived by the owner on May 14, 2024. It is now read-only.

Commit 74d0d3e

Browse files
committed
Merge branch 'release/2018_11_06'
2 parents 11a2566 + 3128bb3 commit 74d0d3e

1,532 files changed

Lines changed: 24294 additions & 864 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
# CERT Coordination Center Vulnerability Data Archive
22

3-
Release 2018-01-30
3+
Release 2018-11-06
44

55

66
### Change Log ###
77

8-
2018-01-30 Updated data.
8+
2018-11-06 Updated data
9+
10+
2018-01-30 Updated data
911

1012
2017-11-08 Updated data. Sorted JSON keys so future updates should
1113
diff more cleanly in git commit logs.
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-03-29T17:29:00-04:00",
4+
"DateNotified": "",
5+
"DateResponded": "",
6+
"ID": "VU#277400",
7+
"Revision": 2,
8+
"Status": "Affected",
9+
"Vendor": "Microsoft",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "WDON-AXBT3U",
12+
"VendorReferences": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}

data/0/vu_277400/vu_277400.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"Author": "This document was written by Will Dormann.",
3+
"CAM_AttackerAccessRequired": "0",
4+
"CAM_EaseOfExploitation": "0",
5+
"CAM_Exploitation": "0",
6+
"CAM_Impact": "0",
7+
"CAM_InternetInfrastructure": "0",
8+
"CAM_Population": "0",
9+
"CAM_ScoreCurrent": 0,
10+
"CAM_ScoreCurrentWidelyKnown": 0,
11+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
12+
"CAM_WidelyKnown": "0",
13+
"CERTAdvisory": "",
14+
"CVEIDs": "CVE-2018-1038",
15+
"CVSS_AccessComplexity": "L",
16+
"CVSS_AccessVector": "L",
17+
"CVSS_Authenication": "S",
18+
"CVSS_AvailabilityImpact": "C",
19+
"CVSS_BaseScore": 6.8,
20+
"CVSS_BaseVector": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
21+
"CVSS_CollateralDamagePotential": "ND",
22+
"CVSS_ConfidentialityImpact": "C",
23+
"CVSS_EnvironmentalScore": 5.88950433792,
24+
"CVSS_EnvironmentalVector": "CDP:ND/TD:H/CR:ND/IR:ND/AR:ND",
25+
"CVSS_Exploitability": "H",
26+
"CVSS_IntegrityImpact": "C",
27+
"CVSS_RemediationLevel": "OF",
28+
"CVSS_ReportConfidence": "C",
29+
"CVSS_SecurityRequirementsAR": "ND",
30+
"CVSS_SecurityRequirementsCR": "ND",
31+
"CVSS_SecurityRequirementsIR": "ND",
32+
"CVSS_TargetDistribution": "H",
33+
"CVSS_TemporalScore": 5.9,
34+
"CVSS_TemporalVector": "E:H/RL:OF/RC:C",
35+
"DateCreated": "2018-03-29T17:06:22-04:00",
36+
"DateFirstPublished": "2018-03-29T17:30:00-04:00",
37+
"DateLastUpdated": "2018-04-24T15:53:00-04:00",
38+
"DatePublic": "2018-03-27T00:00:00",
39+
"Description": "The update that Microsoft has released for meltdown on x64 versions of Windows 7 and Windows Server 2008 R2 incorrectly sets the permission bit for memory accessible from unprivileged user space. As a result, such platforms that have the meltdown update installed, which was released in January 2018 will not properly protect the contents of system memory..",
40+
"ID": "VU#277400",
41+
"IDNumber": "277400",
42+
"IPProtocol": "",
43+
"Impact": "An attacker with the ability to run code on an affected platform as an unprivileged user may be able to read from and write to the entire contents of system memory. Exploit code that uses this vulnerability to escalate privileges from an unprivileged user to SYSTEM privileges is publicly available.",
44+
"Keywords": [
45+
"total meltdown",
46+
"totalmeltdown"
47+
],
48+
"Overview": "When the Microsoft update for meltdown is installed on a Windows 7 x64 or Windows Server 2008 R2 x64 system, an unprivileged process may be able to read and write the entire memory space available to the Windows kernel.",
49+
"References": [
50+
"http://blog.frizk.net/2018/03/total-meltdown.html",
51+
"https://blog.xpnsec.com/total-meltdown-cve-2018-1038/",
52+
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038"
53+
],
54+
"Resolution": "Apply an update This issue is addressed in the Microsoft update for CVE-2018-1038.",
55+
"Revision": 25,
56+
"SystemsAffectedPreamble": "",
57+
"ThanksAndCredit": "This vulnerability was publicly reported by Ulf Frisk.",
58+
"Title": "Windows 7 and Windows Server 2008 R2 x64 fail to protect kernel memory when the Microsoft update for meltdown is installed",
59+
"US-CERTTechnicalAlert": "",
60+
"VRDA_D1_DirectReport": "0",
61+
"VRDA_D1_Impact": "4",
62+
"VRDA_D1_Population": "4",
63+
"VulnerabilityCount": 1,
64+
"Workarounds": ""
65+
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-10-16T14:51:00-04:00",
4+
"DateNotified": "",
5+
"DateResponded": "",
6+
"ID": "VU#176301",
7+
"Revision": 1,
8+
"Status": "Affected",
9+
"Vendor": "Auto-Maskin AS",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "DKLT-B5LQ39",
12+
"VendorReferences": "None",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}

data/1/vu_176301/vu_176301.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"Author": "This document was written by Dan Klinedinst.",
3+
"CAM_AttackerAccessRequired": "0",
4+
"CAM_EaseOfExploitation": "0",
5+
"CAM_Exploitation": "0",
6+
"CAM_Impact": "0",
7+
"CAM_InternetInfrastructure": "0",
8+
"CAM_Population": "0",
9+
"CAM_ScoreCurrent": 0,
10+
"CAM_ScoreCurrentWidelyKnown": 0,
11+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
12+
"CAM_WidelyKnown": "0",
13+
"CERTAdvisory": "",
14+
"CVEIDs": [
15+
" CVE\u20132018-5399",
16+
"CVE-2018-5400",
17+
"CVE-2018-5401",
18+
"CVE-2018-5402"
19+
],
20+
"CVSS_AccessComplexity": "--",
21+
"CVSS_AccessVector": "--",
22+
"CVSS_Authenication": "--",
23+
"CVSS_AvailabilityImpact": "--",
24+
"CVSS_BaseScore": 0,
25+
"CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--",
26+
"CVSS_CollateralDamagePotential": "ND",
27+
"CVSS_ConfidentialityImpact": "--",
28+
"CVSS_EnvironmentalScore": 0,
29+
"CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND",
30+
"CVSS_Exploitability": "ND",
31+
"CVSS_IntegrityImpact": "--",
32+
"CVSS_RemediationLevel": "ND",
33+
"CVSS_ReportConfidence": "ND",
34+
"CVSS_SecurityRequirementsAR": "ND",
35+
"CVSS_SecurityRequirementsCR": "ND",
36+
"CVSS_SecurityRequirementsIR": "ND",
37+
"CVSS_TargetDistribution": "ND",
38+
"CVSS_TemporalScore": 0,
39+
"CVSS_TemporalVector": "E:ND/RL:ND/RC:ND",
40+
"DateCreated": "2018-09-10T10:06:43-04:00",
41+
"DateFirstPublished": "2018-10-06T19:34:55-04:00",
42+
"DateLastUpdated": "2018-10-16T14:52:00-04:00",
43+
"DatePublic": "2018-10-06T00:00:00",
44+
"Description": "CWE 798: \u200bUse of Hard-Coded Credentials - CVE\u20132018-5399\nThe DCU 210E firmware contains an undocumented Dropbear SSH server with a hardcoded username and password. The password is easily susceptible to cracking. CWE-346:\u200bOrigin Validation Error - CVE\u20132018-5400\nThe Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. CWE-319:\u200b Cleartext Transmission of Sensitive Information - CVE\u20132018-5401\nThe devices transmit process control information via unencrypted Modbus communications. CWE-319:\u200b Cleartext Transmission of Sensitive Information - CVE\u20132018-5402\nThe embedded webserver uses unencrypted plaintext for the transmission of the administrator PIN.",
45+
"ID": "VU#176301",
46+
"IDNumber": "176301",
47+
"IPProtocol": "",
48+
"Impact": "An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information. An attacker can send arbitrary ModBus (control) information to the engine control units.",
49+
"Keywords": "[VRF#18-09-KTDMW]",
50+
"Overview": "Auto-Maskin RP remote panels and DCU controls units are used to monitor and control ship engines. The units have several authentication and encryption vulnerabilities which can allow attackers to access the units and control connected engines.",
51+
"References": "",
52+
"Resolution": "CERT/CC is currently unaware of an update to address the vulnerabilities.",
53+
"Revision": 14,
54+
"SystemsAffectedPreamble": "",
55+
"ThanksAndCredit": "Thanks to Brian Satira and Brian Olson for reporting this vulnerability.",
56+
"Title": "Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App",
57+
"US-CERTTechnicalAlert": "",
58+
"VRDA_D1_DirectReport": "1",
59+
"VRDA_D1_Impact": "",
60+
"VRDA_D1_Population": "",
61+
"VulnerabilityCount": 1,
62+
"Workarounds": "Critical control devices such as these should only be accessible via private, carefully secured networks."
63+
}

data/1/vu_992201/vu_992201.json

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -12,26 +12,26 @@
1212
"CAM_WidelyKnown": "0",
1313
"CERTAdvisory": "",
1414
"CVEIDs": "",
15-
"CVSS_AccessComplexity": "",
16-
"CVSS_AccessVector": "",
17-
"CVSS_Authenication": "",
18-
"CVSS_AvailabilityImpact": "",
19-
"CVSS_BaseScore": "",
20-
"CVSS_BaseVector": "",
21-
"CVSS_CollateralDamagePotential": "",
22-
"CVSS_ConfidentialityImpact": "",
23-
"CVSS_EnvironmentalScore": "",
24-
"CVSS_EnvironmentalVector": "",
25-
"CVSS_Exploitability": "",
26-
"CVSS_IntegrityImpact": "",
27-
"CVSS_RemediationLevel": "",
28-
"CVSS_ReportConfidence": "",
29-
"CVSS_SecurityRequirementsAR": "",
30-
"CVSS_SecurityRequirementsCR": "",
31-
"CVSS_SecurityRequirementsIR": "",
32-
"CVSS_TargetDistribution": "",
33-
"CVSS_TemporalScore": "",
34-
"CVSS_TemporalVector": "",
15+
"CVSS_AccessComplexity": "--",
16+
"CVSS_AccessVector": "--",
17+
"CVSS_Authenication": "--",
18+
"CVSS_AvailabilityImpact": "--",
19+
"CVSS_BaseScore": 0,
20+
"CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--",
21+
"CVSS_CollateralDamagePotential": "Not Defined (ND)",
22+
"CVSS_ConfidentialityImpact": "--",
23+
"CVSS_EnvironmentalScore": 0,
24+
"CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)",
25+
"CVSS_Exploitability": "Not Defined (ND)",
26+
"CVSS_IntegrityImpact": "--",
27+
"CVSS_RemediationLevel": "Not Defined (ND)",
28+
"CVSS_ReportConfidence": "Not Defined (ND)",
29+
"CVSS_SecurityRequirementsAR": "Not Defined (ND)",
30+
"CVSS_SecurityRequirementsCR": "Not Defined (ND)",
31+
"CVSS_SecurityRequirementsIR": "Not Defined (ND)",
32+
"CVSS_TargetDistribution": "Not Defined (ND)",
33+
"CVSS_TemporalScore": 0,
34+
"CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)",
3535
"DateCreated": "2003-03-27T17:14:28-04:00",
3636
"DateFirstPublished": "",
3737
"DateLastUpdated": "2003-03-27T17:34:00-04:00",
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-10-16T14:09:00-04:00",
4+
"DateNotified": "2018-07-03T11:52:20-04:00",
5+
"DateResponded": "",
6+
"ID": "VU#581311",
7+
"Revision": 1,
8+
"Status": "Affected",
9+
"Vendor": "TP-LINK",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "CHEU-B2BLPR",
12+
"VendorReferences": "None",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}

data/11/vu_581311/vu_581311.json

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
{
2+
"Author": "This document was written by Garret Wassermann.",
3+
"CAM_AttackerAccessRequired": "0",
4+
"CAM_EaseOfExploitation": "0",
5+
"CAM_Exploitation": "0",
6+
"CAM_Impact": "0",
7+
"CAM_InternetInfrastructure": "0",
8+
"CAM_Population": "0",
9+
"CAM_ScoreCurrent": 0,
10+
"CAM_ScoreCurrentWidelyKnown": 0,
11+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
12+
"CAM_WidelyKnown": "0",
13+
"CERTAdvisory": "",
14+
"CVEIDs": [
15+
"CVE-2018-5393",
16+
"CVE-2015-6420"
17+
],
18+
"CVSS_AccessComplexity": "L",
19+
"CVSS_AccessVector": "N",
20+
"CVSS_Authenication": "N",
21+
"CVSS_AvailabilityImpact": "P",
22+
"CVSS_BaseScore": 7.5,
23+
"CVSS_BaseVector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
24+
"CVSS_CollateralDamagePotential": "ND",
25+
"CVSS_ConfidentialityImpact": "P",
26+
"CVSS_EnvironmentalScore": 5.86048806962325,
27+
"CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND",
28+
"CVSS_Exploitability": "POC",
29+
"CVSS_IntegrityImpact": "P",
30+
"CVSS_RemediationLevel": "OF",
31+
"CVSS_ReportConfidence": "C",
32+
"CVSS_SecurityRequirementsAR": "ND",
33+
"CVSS_SecurityRequirementsCR": "ND",
34+
"CVSS_SecurityRequirementsIR": "ND",
35+
"CVSS_TargetDistribution": "ND",
36+
"CVSS_TemporalScore": 5.9,
37+
"CVSS_TemporalVector": "E:POC/RL:OF/RC:C",
38+
"DateCreated": "2018-06-28T11:57:32-04:00",
39+
"DateFirstPublished": "2018-09-26T09:07:40-04:00",
40+
"DateLastUpdated": "2018-10-30T08:43:00-04:00",
41+
"DatePublic": "2018-09-18T00:00:00",
42+
"Description": "CWE-306: Missing Authentication for Critical Function - CVE-2018-5393 EAP Controller for Linux utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode. CWE-502: Deserialization of Untrusted Data - CVE-2015-6420 EAP Controller for Linux bundles a vulnerable version of Apache commons-collections v3.2.1 with the software, which appears to be the root cause of the vulnerability. Therefore, EAP Controller v2.5.3 and earlier are vulnerable to CVE-2015-6420 as documented in VU#576313. EAP Controller v2.5.3 and earlier for Linux are affected by both vulnerabilities.",
43+
"ID": "VU#581311",
44+
"IDNumber": "581311",
45+
"IPProtocol": "",
46+
"Impact": "A Java application or library with the Apache Commons Collections library in its classpath may be coerced into executing arbitrary Java functions or bytecode.",
47+
"Keywords": [
48+
"eap",
49+
"deserialization",
50+
"java",
51+
"rmi",
52+
"commons-collections"
53+
],
54+
"Overview": "The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. EAP Controller for Linux lacks user authentication for RMI service commands, as well as utilizes an outdated vulnerable version of Apache commons-collections, which may allow an attacker to implement deserialization attacks and control the EAP Controller server.",
55+
"References": [
56+
"https://www.kb.cert.org/vuls/id/576313",
57+
"https://www.tp-link.com/en/download/EAP220.html#Controller_Software",
58+
"https://docs.oracle.com/javase/8/docs/technotes/guides/rmi/rmi_security_recommendations.html",
59+
"http://cwe.mitre.org/data/definitions/306.html",
60+
"http://cwe.mitre.org/data/definitions/502.html"
61+
],
62+
"Resolution": "There is currently no available update to EAP Controller to fully address the vulnerability. However, affected users may take the following actions to help mitigate and reduce risk. As described in VU#576313, updating the vulnerable libraries does not necessarily eliminate the vulnerability in all scenarios.",
63+
"Revision": 97,
64+
"SystemsAffectedPreamble": "",
65+
"ThanksAndCredit": "Thanks to Liu Zhu, of Huawei Weiran Lab for reporting this vulnerability.",
66+
"Title": "TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks",
67+
"US-CERTTechnicalAlert": "",
68+
"VRDA_D1_DirectReport": "0",
69+
"VRDA_D1_Impact": "",
70+
"VRDA_D1_Population": "",
71+
"VulnerabilityCount": 1,
72+
"Workarounds": "Update Apache commons-collections Affected users should update the system Apache commons-collections library to at least version 3.2.2 or 4.1. For details, please see VU#576313. Update the JRE version of EAP Affected users should also update the Java Runtime Environment (JRE) used by EAP to the latest available version. Recent versions of JRE have improved deserialization protection features."
73+
}

0 commit comments

Comments
 (0)