var-201901-0451
Vulnerability from variot
A vulnerability in the Redis implementation used by the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software could allow an unauthenticated, remote attacker to modify key-value pairs for short-lived events stored by the Redis server. The vulnerability is due to improper authentication when accessing the Redis server. An unauthenticated attacker could exploit this vulnerability by modifying key-value pairs stored within the Redis server database. An exploit could allow the attacker to reduce the efficiency of the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. This issue is tracked by Cisco Bug IDs CSCvf08748 and CSCvk64527
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201901-0451", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "policy suite diameter routing agent", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "policy suite for mobile", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "13.0.0" }, { "model": "policy suite diameter routing agent", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "policy suite for mobile", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "policy suite for mobile", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "13.0" }, { "model": "policy suite diameter routing agent", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "policy suite for mobile", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "18.3" } ], "sources": [ { "db": "BID", "id": "106547" }, { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "NVD", "id": "CVE-2018-0181" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:cisco_policy_suite_diameter_routing_agent", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:policy_suite_for_mobile", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001729" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability was found during internal security testing.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-259" } ], "trust": 0.6 }, "cve": "CVE-2018-0181", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-0181", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-118383", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-0181", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2018-0181", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-0181", "trust": 1.0, "value": "CRITICAL" }, { "author": "ykramarz@cisco.com", "id": "CVE-2018-0181", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-0181", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201901-259", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-118383", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-118383" }, { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "CNNVD", "id": "CNNVD-201901-259" }, { "db": "NVD", "id": "CVE-2018-0181" }, { "db": "NVD", "id": "CVE-2018-0181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Redis implementation used by the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software could allow an unauthenticated, remote attacker to modify key-value pairs for short-lived events stored by the Redis server. The vulnerability is due to improper authentication when accessing the Redis server. An unauthenticated attacker could exploit this vulnerability by modifying key-value pairs stored within the Redis server database. An exploit could allow the attacker to reduce the efficiency of the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software. \nAn attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. \nThis issue is tracked by Cisco Bug IDs CSCvf08748 and CSCvk64527", "sources": [ { "db": "NVD", "id": "CVE-2018-0181" }, { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "BID", "id": "106547" }, { "db": "VULHUB", "id": "VHN-118383" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0181", "trust": 2.8 }, { "db": "BID", "id": "106547", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-001729", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201901-259", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-118383", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118383" }, { "db": "BID", "id": "106547" }, { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "CNNVD", "id": "CNNVD-201901-259" }, { "db": "NVD", "id": "CVE-2018-0181" } ] }, "id": "VAR-201901-0451", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-118383" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:45:07.547000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190109-cps-redis", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cps-redis" }, { "title": "Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88442" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "CNNVD", "id": "CNNVD-201901-259" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118383" }, { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "NVD", "id": "CVE-2018-0181" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190109-cps-redis" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/106547" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0181" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-118383" }, { "db": "BID", "id": "106547" }, { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "CNNVD", "id": "CNNVD-201901-259" }, { "db": "NVD", "id": "CVE-2018-0181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-118383" }, { "db": "BID", "id": "106547" }, { "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "db": "CNNVD", "id": "CNNVD-201901-259" }, { "db": "NVD", "id": "CVE-2018-0181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-10T00:00:00", "db": "VULHUB", "id": "VHN-118383" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106547" }, { "date": "2019-03-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "date": "2019-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-259" }, { "date": "2019-01-10T00:29:00.250000", "db": "NVD", "id": "CVE-2018-0181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118383" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106547" }, { "date": "2019-03-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001729" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-259" }, { "date": "2024-11-21T03:37:40.750000", "db": "NVD", "id": "CVE-2018-0181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-259" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Policy Suite for Mobile and Policy Suite Diameter Routing Agent Vulnerability related to lack of authentication for critical functions in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001729" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-259" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.