Lucene search

K
cve[email protected]CVE-2018-7951
HistoryJun 01, 2018 - 2:29 p.m.

CVE-2018-7951

2018-06-0114:29:00
CWE-94
web.nvd.nist.gov
25
ibmc
huawei
json injection
vulnerability
remote attacker
admin password
privilege escalation

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.9%

The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a JSON injection vulnerability due to insufficient input validation. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Successful exploit may allow attackers to obtain the management privilege of the system.

Affected configurations

NVD
Node
huawei1288h_v5_firmwareMatch100r005c00
AND
huawei1288h_v5Match-
Node
huawei2288h_v5_firmwareMatch100r005c00
AND
huawei2288h_v5Match-
Node
huawei2488_v5_firmwareMatch100r005c00
AND
huawei2488_v5Match-
Node
huaweich121_v3_firmwareMatch100r001c00
AND
huaweich121_v3Match-
Node
huaweich121l_v3_firmwareMatch100r001c00
AND
huaweich121l_v3Match-
Node
huaweich121l_v5_firmwareMatch100r001c00
AND
huaweich121l_v5Match-
Node
huaweich121_v5_firmwareMatch100r001c00
AND
huaweich121_v5Match-
Node
huaweich140_v3_firmwareMatch100r001c00
AND
huaweich140_v3Match-
Node
huaweich140l_v3_firmwareMatch100r001c00
AND
huaweich140l_v3Match-
Node
huaweich220_v3_firmwareMatch100r001c00
AND
huaweich220_v3Match-
Node
huaweich222_v3_firmwareMatch100r001c00
AND
huaweich222_v3Match-
Node
huaweich242_v3Match-
AND
huaweich242_v3_firmwareMatch100r001c00
Node
huaweich242_v5Match-
AND
huaweich242_v5_firmwareMatch100r001c00
Node
huaweirh1288_v3Match-
AND
huaweirh1288_v3_firmwareMatch100r003c00
Node
huaweirh2288_v3Match-
AND
huaweirh2288_v3_firmwareMatch100r003c00
Node
huaweixh310_v3Match-
AND
huaweixh310_v3_firmwareMatch100r003c00
Node
huaweixh321_v3_firmwareMatch100r003c00
AND
huaweixh321_v3Match-
Node
huaweixh321_v5Match-
AND
huaweixh321_v5_firmwareMatch100r005c00
Node
huaweirh2288h_v3Match-
AND
huaweirh2288h_v3_firmwareMatch100r003c00
Node
huaweixh620_v3Match-
AND
huaweixh620_v3_firmwareMatch100r003c00

CNA Affected

[
  {
    "product": "1288H V5; 2288H V5; 2488 V5 ; CH121 V3; CH121L V3; CH121L V5 ; CH121 V5 ; CH140 V3; CH140L V3; CH220 V3; CH222 V3; CH242 V3; CH242 V5 ; RH1288 V3; RH2288 V3; RH2288H V3; XH310 V3; XH321 V3; XH321 V5; XH620 V3",
    "vendor": "Huawei Technologies Co., Ltd.",
    "versions": [
      {
        "status": "affected",
        "version": "1288H V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "2288H V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "2488 V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "CH121 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121L V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121L V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH121 V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH140 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH140L V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH220 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH222 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH242 V3 V100R001C00"
      },
      {
        "status": "affected",
        "version": "CH242 V5 V100R001C00"
      },
      {
        "status": "affected",
        "version": "RH1288 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "RH2288 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "RH2288H V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH310 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH321 V3 V100R003C00"
      },
      {
        "status": "affected",
        "version": "XH321 V5 V100R005C00"
      },
      {
        "status": "affected",
        "version": "XH620 V3 V100R003C00"
      }
    ]
  }
]

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.9%

Related for CVE-2018-7951