Vulnerability Details : CVE-2018-0434
A vulnerability in the Zero Touch Provisioning feature of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.
Vulnerability category: Bypass
Products affected by CVE-2018-0434
- cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:vmanage_network_management_system:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-0434
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-0434
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
7.4
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
NIST |
CWE ids for CVE-2018-0434
-
The product does not validate, or incorrectly validates, a certificate.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2018-0434
-
http://www.securityfocus.com/bid/105294
Cisco SD-WAN CVE-2018-0434 Certificate Validation Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-validation
Cisco SD-WAN Solution Certificate Validation VulnerabilityVendor Advisory
Jump to