Vulnerability Details : CVE-2018-10079
Geist WatchDog Console 3.2.2 uses a weak ACL for the C:\ProgramData\WatchDog Console directory, which allows local users to modify configuration data by updating (1) config.xml or (2) servers.xml.
Products affected by CVE-2018-10079
- cpe:2.3:o:vertiv:watchdog_console:3.2.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-10079
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-10079
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
3.9
|
2.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2018-10079
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-10079
-
https://www.exploit-db.com/exploits/44493/
Geist WatchDog Console 3.2.2 - Multiple VulnerabilitiesExploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html
Geist WatchDog Console 3.2.2 XSS / XML Injection / Insecure Permissions ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to