ID CVE-2018-9158 Type cve Reporter cve@mitre.org Modified 2018-05-15T15:35:00
Description
An issue was discovered on AXIS M1033-W (IP camera) Firmware version 5.40.5.1 devices. They don't employ a suitable mechanism to prevent a DoS attack, which leads to a response time delay. An attacker can use the hping3 tool to perform an IPv4 flood attack, and the services are interrupted from attack start to end.
{"id": "CVE-2018-9158", "bulletinFamily": "NVD", "title": "CVE-2018-9158", "description": "An issue was discovered on AXIS M1033-W (IP camera) Firmware version 5.40.5.1 devices. They don't employ a suitable mechanism to prevent a DoS attack, which leads to a response time delay. An attacker can use the hping3 tool to perform an IPv4 flood attack, and the services are interrupted from attack start to end.", "published": "2018-04-01T18:29:00", "modified": "2018-05-15T15:35:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9158", "reporter": "cve@mitre.org", "references": ["https://www.slideshare.net/secret/HpAEwK5qo5U4b1"], "cvelist": ["CVE-2018-9158"], "type": "cve", "lastseen": "2020-10-03T13:20:27", "edition": 3, "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310113151"]}], "modified": "2020-10-03T13:20:27", "rev": 2}, "score": {"value": 4.4, "vector": "NONE", "modified": "2020-10-03T13:20:27", "rev": 2}, "vulnersScore": 4.4}, "cpe": ["cpe:/o:axis:m1033-w_firmware:5.40.5.1"], "affectedSoftware": [{"cpeName": "axis:m1033-w_firmware", "name": "axis m1033-w firmware", "operator": "eq", "version": "5.40.5.1"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "cpe23": ["cpe:2.3:o:axis:m1033-w_firmware:5.40.5.1:*:*:*:*:*:*:*"], "cwe": ["CWE-20"], "scheme": null, "affectedConfiguration": [{"cpeName": "axis:m1033-w", "name": "axis m1033-w", "operator": "eq", "version": "-"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:axis:m1033-w_firmware:5.40.5.1:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}]}}
{"openvas": [{"lastseen": "2019-05-29T18:32:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-9158"], "description": "An issue was discovered on AXIS M1033-W (IP camera) devices.\n They don", "modified": "2018-10-23T00:00:00", "published": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310113151", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310113151", "type": "openvas", "title": "AXIS M1033-W IP Camera Denial of Service Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_axis_network_camera_dos_vuln.nasl 12026 2018-10-23 08:22:54Z mmartin $\n#\n# AXIS M1033-W IP Camera Denial of Service Vulnerability\n#\n# Authors:\n# Jan Philipp Schulte <jan.schulte@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, https://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif( description )\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.113151\");\n script_version(\"$Revision: 12026 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-23 10:22:54 +0200 (Tue, 23 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-04-06 13:37:37 +0200 (Fri, 06 Apr 2018)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_cve_id(\"CVE-2018-9158\");\n\n script_name(\"AXIS M1033-W IP Camera Denial of Service Vulnerability\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_axis_network_cameras_ftp_detect.nasl\");\n script_mandatory_keys(\"axis/camera/installed\");\n\n script_tag(name:\"summary\", value:\"An issue was discovered on AXIS M1033-W (IP camera) devices.\n They don't employ a suitable mechanism to prevent a DoS attack, which leads to a response time delay.\n An attacker can use the hping3 tool to perform an IPv4 flood attack, and the services are interrupted from attack start to end.\");\n script_tag(name:\"vuldetect\", value:\"The script checks if the target is a vulnerable device running a vulnerable firmware version.\");\n script_tag(name:\"affected\", value:\"Firmware before version 5.50.5.0\");\n script_tag(name:\"solution\", value:\"Update to firmware version 5.50.5.0 or above.\");\n\n script_xref(name:\"URL\", value:\"https://www.slideshare.net/secret/HpAEwK5qo5U4b1\");\n script_xref(name:\"URL\", value:\"https://www.axis.com/de-de/support/firmware\");\n\n exit(0);\n}\n\nCPE = \"cpe:/a:axis:network_camera\";\n\ninclude( \"host_details.inc\" );\ninclude( \"version_func.inc\" );\n\nif( ! port = get_app_port( cpe: CPE ) ) exit( 0 );\nif( ! version = get_app_version( cpe: CPE, port: port ) ) exit( 0 );\n\nmodel = get_kb_item( \"axis/camera/model\" );\n\nif( \"M1033\" >!< model ) exit( 0 );\n\nif( version_is_less( version: version, test_version: \"5.50.5\" ) ) {\n report = report_fixed_ver( installed_version: version, fixed_version: \"5.50.5\" );\n security_message( data: report, port: port );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}