Vulnerability Details : CVE-2018-18473
A hidden backdoor on PATLITE NH-FB Series devices with firmware version 1.45 or earlier, NH-FV Series devices with firmware version 1.10 or earlier, and NBM Series devices with firmware version 1.09 or earlier allow attackers to enable an SSH daemon via the "kankichi" or "kamiyo4" password to the _secret1.htm URI. Subsequently, the default password of root for the root account allows an attacker to conduct remote code execution and as a result take over the system.
Vulnerability category: Execute code
Products affected by CVE-2018-18473
- cpe:2.3:o:patlite:nbm-d88n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:patlite:nhl-3fb1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:patlite:nhl-3fv1n_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-18473
1.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18473
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-18473
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18473
-
https://www.patlite.com/support/Security_Informationtest.html
Security Information|PATLITE
-
https://herolab.usd.de/wp-content/uploads/sites/4/usd20180020.txt
Exploit;Third Party Advisory
Jump to