Vulnerability Name:

CVE-2018-0284 (CCN-152672)

Assigned:2017-11-27
Published:2018-11-07
Updated:2019-10-09
Summary:A vulnerability in the local status page functionality of the Cisco Meraki MR, MS, MX, Z1, and Z3 product lines could allow an authenticated, remote attacker to modify device configuration files. The vulnerability occurs when handling requests to the local status page. An exploit could allow the attacker to establish an interactive session to the device with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device that is being exploited.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2018-0284

Source: BID
Type: Third Party Advisory, VDB Entry
105878

Source: XF
Type: UNKNOWN
cisco-cve20180284-priv-esc(152672)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20181107-meraki
Cisco Meraki Local Status Page Privilege Escalation Vulnerability

Source: CISCO
Type: Vendor Advisory
20181107 Cisco Meraki Local Status Page Privilege Escalation Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:meraki_mr_24_firmware:*:*:*:*:*:*:*:* (Version < 24.13)
  • OR cpe:/o:cisco:meraki_mr_25_firmware:*:*:*:*:*:*:*:* (Version < 25.11)
  • AND
  • cpe:/h:cisco:meraki_mr:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:cisco:meraki_ms_10_firmware:*:*:*:*:*:*:*:* (Version < 10.20)
  • OR cpe:/o:cisco:meraki_ms_9_firmware:*:*:*:*:*:*:*:* (Version < 9.37)
  • AND
  • cpe:/h:cisco:meraki_ms:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:cisco:meraki_mx_13_firmware:*:*:*:*:*:*:*:* (Version < 13.32)
  • OR cpe:/o:cisco:meraki_mx_14_firmware:*:*:*:*:*:*:*:* (Version < 14.25)
  • OR cpe:/o:cisco:meraki_mx_15_firmware:*:*:*:*:*:*:*:* (Version < 15.7)
  • AND
  • cpe:/h:cisco:meraki_mx:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:cisco:meraki_mx_13_firmware:*:*:*:*:*:*:*:* (Version < 13.32)
  • OR cpe:/o:cisco:meraki_mx_14_firmware:*:*:*:*:*:*:*:* (Version < 14.25)
  • OR cpe:/o:cisco:meraki_mx_15_firmware:*:*:*:*:*:*:*:* (Version < 15.7)
  • AND
  • cpe:/h:cisco:meraki_z1:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:cisco:meraki_mx_13_firmware:*:*:*:*:*:*:*:* (Version < 13.32)
  • OR cpe:/o:cisco:meraki_mx_14_firmware:*:*:*:*:*:*:*:* (Version < 14.25)
  • OR cpe:/o:cisco:meraki_mx_15_firmware:*:*:*:*:*:*:*:* (Version < 15.7)
  • AND
  • cpe:/h:cisco:meraki_z3:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:cisco:meraki_ms:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:meraki_mr:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:meraki_mx:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:meraki_z1:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:meraki_z3:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco meraki mr 24 firmware *
    cisco meraki mr 25 firmware *
    cisco meraki mr -
    cisco meraki ms 10 firmware *
    cisco meraki ms 9 firmware *
    cisco meraki ms -
    cisco meraki mx 13 firmware *
    cisco meraki mx 14 firmware *
    cisco meraki mx 15 firmware *
    cisco meraki mx -
    cisco meraki mx 13 firmware *
    cisco meraki mx 14 firmware *
    cisco meraki mx 15 firmware *
    cisco meraki z1 -
    cisco meraki mx 13 firmware *
    cisco meraki mx 14 firmware *
    cisco meraki mx 15 firmware *
    cisco meraki z3 -
    cisco meraki ms *
    cisco meraki mr *
    cisco meraki mx *
    cisco meraki z1 -
    cisco meraki z3 -