{"api_version":"1","generated_at":"2026-05-10T22:51:10+00:00","cve":"CVE-2018-0454","urls":{"html":"https://cve.report/CVE-2018-0454","api":"https://cve.report/api/cve/CVE-2018-0454.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-0454","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-0454"},"summary":{"title":"CVE-2018-0454","description":"A vulnerability in the web-based management interface of Cisco Cloud Services Platform 2100 could allow an authenticated, remote attacker to perform command injection. The vulnerability is due to insufficient input validation of command input. An attacker could exploit this vulnerability by sending customized commands to the web-based management interface.","state":"PUBLIC","assigner":"psirt@cisco.com","published_at":"2018-10-05 14:29:00","updated_at":"2019-10-09 23:32:00"},"problem_types":["CWE-77"],"metrics":[],"references":[{"url":"http://www.securitytracker.com/id/1041683","name":"1041683","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Cloud Services Platform 2100 Input Validation Flaw Lets Remote Authenticated Users Execute Arbitrary Commands on the Target System - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-csp2100-injection","name":"20180905 Cisco Cloud Services Platform 2100 Command Injection Vulnerability","refsource":"CISCO","tags":["Vendor Advisory"],"title":"Cisco Cloud Services Platform 2100 Command Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-0454","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-0454","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"454","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"cloud_services_platform_2100","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"454","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"cloud_services_platform_2100","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"454","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"cloud_services_platform_2100_firmware","cpe6":"2.2(4)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"454","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"cloud_services_platform_2100_firmware","cpe6":"2.2\\(4\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"454","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"cloud_services_platform_2100_firmware","cpe6":"2.2\\(4\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","DATE_PUBLIC":"2018-09-05T16:00:00-0500","ID":"CVE-2018-0454","STATE":"PUBLIC","TITLE":"Cisco Cloud Services Platform 2100 Command Injection Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Cisco Cloud Services Platform 2100  ","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"Cisco"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the web-based management interface of Cisco Cloud Services Platform 2100 could allow an authenticated, remote attacker to perform command injection. The vulnerability is due to insufficient input validation of command input. An attacker could exploit this vulnerability by sending customized commands to the web-based management interface."}]},"impact":{"cvss":{"baseScore":"4.7","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-77"}]}]},"references":{"reference_data":[{"name":"20180905 Cisco Cloud Services Platform 2100 Command Injection Vulnerability","refsource":"CISCO","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-csp2100-injection"},{"name":"1041683","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1041683"}]},"source":{"advisory":"cisco-sa-20180905-csp2100-injection","defect":[["CSCvj39693"]],"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2018-10-05 14:29:00","lastModifiedDate":"2019-10-09 23:32:00","problem_types":["CWE-77"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:cisco:cloud_services_platform_2100_firmware:2.2\\(4\\):*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:cisco:cloud_services_platform_2100:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"454","Ordinal":"115267","Title":"CVE-2018-0454","CVE":"CVE-2018-0454","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"454","Ordinal":"1","NoteData":"A vulnerability in the web-based management interface of Cisco Cloud Services Platform 2100 could allow an authenticated, remote attacker to perform command injection. The vulnerability is due to insufficient input validation of command input. An attacker could exploit this vulnerability by sending customized commands to the web-based management interface.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"454","Ordinal":"2","NoteData":"2018-10-05","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"454","Ordinal":"3","NoteData":"2018-10-07","Type":"Other","Title":"Modified"}]}}}