Vulnerability Name: | CVE-2018-10168 (CCN-142826) | ||||||||||||
Assigned: | 2018-05-03 | ||||||||||||
Published: | 2018-05-03 | ||||||||||||
Updated: | 2019-10-03 | ||||||||||||
Summary: | TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows do not control privileges for usage of the Web API, allowing a low-privilege user to make any request as an Administrator. This is fixed in version 2.6.1_Windows. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-10168 Source: CCN Type: Full-Disclosure Mailing List, Thu, 3 May 2018 17:06:15 -0300 [CORE-2018-0001] TP-Link EAP Controller Multiple Vulnerabilities Source: BID Type: Third Party Advisory, VDB Entry 104094 Source: CCN Type: BID-104094 TP-Link EAP Controller and Omada Controller Multiple Security Vulnerabilities Source: XF Type: UNKNOWN tplink-cve201810168-priv-esc(142826) Source: CCN Type: Packet Storm Security [05-04-2018] TP-Link EAP Controller CSRF / Hard-Coded Key / XSS Source: MISC Type: Exploit, Third Party Advisory https://www.coresecurity.com/advisories/tp-link-eap-controller-multiple-vulnerabilities Source: CCN Type: TP-Link Web site TP-Link EAP Controller and Omada Controller | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |