The web-based diagnostics console in Dell EMC iDRAC6 (Monolithic versions prior to 2.91 and Modular all versions) contains a command injection vulnerability. A remote authenticated malicious iDRAC user with access to the diagnostics console could potentially exploit this vulnerability to execute arbitrary commands as root on the affected iDRAC system.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(501918);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/18");
script_cve_id("CVE-2018-1212");
script_name(english:"Dell iDRAC6 Command Injection (CVE-2018-1212)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"The web-based diagnostics console in Dell EMC iDRAC6 (Monolithic
versions prior to 2.91 and Modular all versions) contains a command
injection vulnerability. A remote authenticated malicious iDRAC user
with access to the diagnostics console could potentially exploit this
vulnerability to execute arbitrary commands as root on the affected
iDRAC system.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
script_set_attribute(attribute:"see_also", value:"http://en.community.dell.com/techcenter/extras/m/white_papers/20487494");
script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-1212");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(77);
script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/02");
script_set_attribute(attribute:"patch_publication_date", value:"2018/07/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/01/17");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:dell:idrac6_modular");
script_set_attribute(attribute:"cpe", value:"cpe:/a:dell:idrac6_monolithic");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/Dell");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/Dell');
var asset = tenable_ot::assets::get(vendor:'Dell');
var vuln_cpes = {
"cpe:/a:dell:idrac6_modular" :
{"family" : "iDRAC6"},
"cpe:/a:dell:idrac6_monolithic" :
{"versionEndExcluding" : "2.91", "family" : "iDRAC6"}
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
dell | idrac6_modular | cpe:/a:dell:idrac6_modular | |
dell | idrac6_monolithic | cpe:/a:dell:idrac6_monolithic |