{"api_version":"1","generated_at":"2026-04-22T21:27:03+00:00","cve":"CVE-2018-3854","urls":{"html":"https://cve.report/CVE-2018-3854","api":"https://cve.report/api/cve/CVE-2018-3854.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-3854","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-3854"},"summary":{"title":"CVE-2018-3854","description":"An exploitable information disclosure vulnerability exists in the password protection functionality of Quicken Deluxe 2018 for Mac version 5.2.2. A specially crafted sqlite3 request can cause the removal of the password protection, allowing an attacker to access and modify the data without knowing the password. An attacker needs to have access to the password-protected files to trigger this vulnerability.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2018-12-03 22:29:00","updated_at":"2022-12-03 14:20:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0537","name":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0537","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"TALOS-2018-0537 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-3854","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3854","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"3854","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intuit","cpe5":"quicken_2018","cpe6":"5.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"deluxe","cpe11":"macos","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3854","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intuit","cpe5":"quicken_2018","cpe6":"5.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"deluxe","cpe11":"macos","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"talos-cna@cisco.com","ID":"CVE-2018-3854","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An exploitable information disclosure vulnerability exists in the password protection functionality of Quicken Deluxe 2018 for Mac version 5.2.2. A specially crafted sqlite3 request can cause the removal of the password protection, allowing an attacker to access and modify the data without knowing the password. An attacker needs to have access to the password-protected files to trigger this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0537","refsource":"MISC","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0537"}]},"impact":{"cvss":{"baseScore":7.1,"baseSeverity":"High","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.0"}}},"nvd":{"publishedDate":"2018-12-03 22:29:00","lastModifiedDate":"2022-12-03 14:20:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.6},"severity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intuit:quicken_2018:5.2.2:*:*:*:deluxe:macos:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"3854","Ordinal":"119768","Title":"CVE-2018-3854","CVE":"CVE-2018-3854","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"3854","Ordinal":"1","NoteData":"An exploitable information disclosure vulnerability exists in the password protection functionality of Quicken Deluxe 2018 for Mac version 5.2.2. A specially crafted sqlite3 request can cause the removal of the password protection, allowing an attacker to access and modify the data without knowing the password. An attacker needs to have access to the password-protected files to trigger this vulnerability.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"3854","Ordinal":"2","NoteData":"2018-12-03","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"3854","Ordinal":"3","NoteData":"2018-12-03","Type":"Other","Title":"Modified"}]}}}