CVE-2018-6961

Scores

EPSS

0.936high93.6%
0%20%40%60%80%100%

Percentile: 93.6%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-78

Exploits

Exploit ID: 44959

Source: exploitdb

URL: https://www.exploit-db.com/exploits/44959

Exploit ID: CVE-2018-6961

Source: github-poc

URL: https://github.com/r3dxpl0it/CVE-2018-6961

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: nsx_sd-wan_by_velocloud

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:vmware:nsx_sd-wan_by_velocloud:*:*:*:*:*:*:*:*",      "versionEndExcluding": "3.1.0",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list