Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2018-11681
HistoryJun 02, 2018 - 1:00 p.m.

CVE-2018-11681

2018-06-0213:00:00
mitre
github.com
5

AI Score

7.9

Confidence

Low

EPSS

0.005

Percentile

76.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Default and unremovable support credentials (user:nwk password:nwk2) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the RadioRA 2 Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:lutron:stanza_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "lutron",
    "product": "stanza_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:lutron:radiora_2_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "lutron",
    "product": "radiora_2_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:lutron:homeworks_qs_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "lutron",
    "product": "homeworks_qs_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

7.9

Confidence

Low

EPSS

0.005

Percentile

76.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2018-11681