Vulnerability Details : CVE-2018-10900

Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. A new line character can be used to inject a Password helper parameter into the configuration data passed to VPNC, allowing an attacker to execute arbitrary commands as root.
Vulnerability category: Gain privilege
Published 2018-07-26 15:29:00
Updated 2020-12-04 18:15:12
Source Red Hat, Inc.
View at NVD,   CVE.org
At least one public exploit which can be used to exploit this vulnerability exists!

Exploit prediction scoring system (EPSS) score for CVE-2018-10900

Probability of exploitation activity in the next 30 days: 0.36%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 69 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2018-10900

  • Network Manager VPNC Username Privilege Escalation
    Disclosure Date: 2018-07-26
    First seen: 2020-04-26
    exploit/linux/local/network_manager_vpnc_username_priv_esc
    This module exploits an injection vulnerability in the Network Manager VPNC plugin to gain root privileges. This module uses a new line injection vulnerability in the configured username for a VPN network connection to inject a `Password helper` configuratio

CVSS scores for CVE-2018-10900

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
7.2
HIGH AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
nvd@nist.gov
8.8
HIGH CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2.0
6.0
secalert@redhat.com
7.8
HIGH CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.8
5.9
nvd@nist.gov

CWE ids for CVE-2018-10900

References for CVE-2018-10900

Products affected by CVE-2018-10900

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!