Lucene search

K
cvelistKrcertCVELIST:CVE-2018-5199
HistoryDec 20, 2018 - 2:00 p.m.

CVE-2018-5199 WIZVERA Remote Code Execution Vulnerability

2018-12-2014:00:00
krcert
www.cve.org
3

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.003

Percentile

71.8%

In Veraport G3 ALL on MacOS, due to insufficient domain validation, It is possible to overwrite installation file to malicious file. A remote unauthenticated attacker may use this vulnerability to execute arbitrary file.

CNA Affected

[
  {
    "platforms": [
      "Mac OS"
    ],
    "product": "Veraport",
    "vendor": "WIZVERA",
    "versions": [
      {
        "status": "affected",
        "version": "G3 all"
      }
    ]
  }
]

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.003

Percentile

71.8%

Related for CVELIST:CVE-2018-5199