Lucene search

K
cve[email protected]CVE-2018-10627
HistoryJul 24, 2018 - 5:29 p.m.

CVE-2018-10627

2018-07-2417:29:00
CWE-200
web.nvd.nist.gov
31
cve-2018-10627
echelon smartserver
i.lon
soap api
unauthorized access
sensitive configuration
nvd

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.6%

Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers. This vulnerability does not affect the i.LON 600 product.

Affected configurations

NVD
Node
echelonsmartserver_1_firmware
AND
echelonsmartserver_1Match-
Node
echelonsmartserver_2_firmwareRange<4.11.007
AND
echelonsmartserver_2Match-
Node
echeloni.lon_100_firmware
AND
echeloni.lon_100Match-

CNA Affected

[
  {
    "product": "SmartServer 1",
    "vendor": "Echelon",
    "versions": [
      {
        "status": "affected",
        "version": "all versions"
      }
    ]
  },
  {
    "product": "SmartServer 2",
    "vendor": "Echelon",
    "versions": [
      {
        "status": "affected",
        "version": "all versions prior to release 4.11.007"
      }
    ]
  },
  {
    "product": "i.LON 100",
    "vendor": "Echelon",
    "versions": [
      {
        "status": "affected",
        "version": "all versions"
      }
    ]
  },
  {
    "product": "i.LON 600",
    "vendor": "Echelon",
    "versions": [
      {
        "status": "affected",
        "version": "all versions"
      }
    ]
  }
]

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.6%

Related for CVE-2018-10627