// For flags

CVE-2018-0463

Cisco Network Services Orchestrator Network Plug and Play Information Disclosure Vulnerability

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Cisco Network Plug and Play server component of Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to gain unauthorized access to configuration data that is stored on an affected NSO system. The vulnerability exists because the Network Plug and Play component performs incomplete validation when configured to use secure unique device identifiers (SUDI) for authentication. An attacker who controls a Cisco device that supports SUDI authentication and has connectivity to an affected NSO system could exploit this vulnerability. The attacker would need to leverage information about the devices that are being registered on the NSO server to send crafted Cisco Network Plug and Play authentication packets to an affected system. A successful exploit could allow the attacker to gain unauthorized access to configuration data for devices that will be managed by the NSO system.

Una vulnerabilidad en el componente de servidor Cisco Network Plug and Play de Cisco Network Services Orchestrator (NSO) podría permitir a un atacante remoto no autenticado obtener acceso no autorizado a los datos de configuración que se almacenan en un sistema NSO afectado. La vulnerabilidad existe porque el componente Network Plug and Play realiza una validación incompleta cuando se configura para utilizar identificadores de dispositivo únicos y seguros (SUDI) para la autenticación. Un atacante que controle un dispositivo Cisco que soporte autenticación SUDI y tenga conectividad con un sistema NSO afectado podría explotar esta vulnerabilidad. El atacante tendría que aprovechar la información sobre los dispositivos que se están registrando en el servidor NSO para enviar paquetes de autenticación Cisco Network Plug and Play a un sistema afectado. Su explotación con éxito podría permitir al atacante obtener acceso no autorizado a los datos de configuración de los dispositivos que serán administrados por el sistema NSO.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-10-05 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Network Services Orchestrator
Search vendor "Cisco" for product "Network Services Orchestrator"
1.2.0
Search vendor "Cisco" for product "Network Services Orchestrator" and version "1.2.0"
-
Affected