Vulnerability Name:

CVE-2018-15716 (CCN-153573)

Assigned:2018-11-29
Published:2018-11-29
Updated:2019-10-09
Summary:NUUO NVRMini2 version 3.9.1 is vulnerable to authenticated remote command injection. An attacker can send crafted requests to upgrade_handle.php to execute OS commands as root.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-78
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2018-15716

Source: BID
Type: Third Party Advisory, VDB Entry
106059

Source: XF
Type: UNKNOWN
nuuo-cve201815716-cmd-exec(153573)

Source: CCN
Type: GitHub Web site
poc_nuuo_upgrade_handle.py

Source: MISC
Type: Exploit, Third Party Advisory
https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_15716

Source: CCN
Type: Packet Storm Security [12-05-2018]
NUUO NVRMini2 3.9.1 Command Injection

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [12-04-2018]

Source: EXPLOIT-DB
Type: Exploit, Third Party Advisory, VDB Entry
45948

Source: CCN
Type: NUUO Web site
NUUO NVRMini2

Source: CCN
Type: Tenable Web site
[R1] NUUO NVRMini2 Authenticated Command Injection

Source: MISC
Type: Exploit, Third Party Advisory
https://www.tenable.com/security/research/tra-2018-41

Vulnerable Configuration:Configuration 1:
  • cpe:/o:nuuo:nvrmini2_firmware:3.9.1:*:*:*:*:*:*:*
  • AND
  • cpe:/h:nuuo:ne-2020:-:*:*:*:*:*:*:*
  • OR cpe:/h:nuuo:ne-2040:-:*:*:*:*:*:*:*
  • OR cpe:/h:nuuo:ne-4080:-:*:*:*:*:*:*:*
  • OR cpe:/h:nuuo:ne-4160:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    nuuo nvrmini2 firmware 3.9.1
    nuuo ne-2020 -
    nuuo ne-2040 -
    nuuo ne-4080 -
    nuuo ne-4160 -