Lucene search

K
cve[email protected]CVE-2018-8119
HistoryMay 09, 2018 - 7:29 p.m.

CVE-2018-8119

2018-05-0919:29:01
CWE-295
web.nvd.nist.gov
65
azure
iot
device provisioning
spoofing
vulnerability
amqp
c#
sdk
java

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

5.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

44.0%

A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka β€œAzure IoT SDK Spoofing Vulnerability.” This affects C# SDK, C SDK, Java SDK.

Affected configurations

Vulners
NVD
Node
microsoftc_sdk_for_azure_iot
Node
microsoftc_sdk_for_azure_iot
Node
microsoftazure_sdk_for_java
VendorProductVersionCPE
microsoftc_sdk_for_azure_iot*cpe:2.3:a:microsoft:c_sdk_for_azure_iot:*:*:*:*:*:*:*:*
microsoftc_sdk_for_azure_iot*cpe:2.3:a:microsoft:c_sdk_for_azure_iot:*:*:*:*:*:*:*:*
microsoftazure_sdk_for_java*cpe:2.3:a:microsoft:azure_sdk_for_java:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "C# SDK",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "Azure IoT"
      }
    ]
  },
  {
    "product": "C SDK",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "Azure IoT"
      }
    ]
  },
  {
    "product": "Java SDK",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "Azure IoT"
      }
    ]
  }
]

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

5.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

44.0%