// For flags

CVE-2018-0089

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Policy and Charging Rules Function (PCRF) of the Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access sensitive data. The attacker could use this information to conduct additional reconnaissance attacks. The attacker would also have to have access to the internal VLAN where CPS is deployed. The vulnerability is due to incorrect permissions of certain system files and not sufficiently protecting sensitive data that is at rest. An attacker could exploit the vulnerability by using certain tools available on the internal network interface to request and view system files. An exploit could allow the attacker to find out sensitive information about the application. Cisco Bug IDs: CSCvf77666.

Una vulnerabilidad en la función PCRF (Policy and Charging Rules Function) de Cisco Policy Suite (CPS) podría permitir que un atacante remoto no autenticado acceda a datos sensibles. El atacante podría utilizar esta información para llevar a cabo ataques de reconocimiento adicionales. El atacante podría también necesitar tener acceso a la VLAN interna donde el CPS está desplegado. La vulnerabilidad se debe a permisos incorrectos de determinados archivos del sistema y a que no se protegen lo suficiente los datos sensibles que están en reposo. Un atacante podría explotar la vulnerabilidad utilizando determinadas herramientas disponibles en la interfaz de red interna para solicitar y visualizar archivos del sistema. Un exploit podría permitir que el atacante descubra información sensible sobre la aplicación. Cisco Bug IDs: CSCvf77666.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-01-18 CVE Published
  • 2023-06-11 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-312: Cleartext Storage of Sensitive Information
  • CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
10.0.0
Search vendor "Cisco" for product "Policy Suite" and version "10.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
11.0.0
Search vendor "Cisco" for product "Policy Suite" and version "11.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
11.1.0
Search vendor "Cisco" for product "Policy Suite" and version "11.1.0"
-
Affected