{"api_version":"1","generated_at":"2026-04-22T22:49:21+00:00","cve":"CVE-2018-5488","urls":{"html":"https://cve.report/CVE-2018-5488","api":"https://cve.report/api/cve/CVE-2018-5488.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-5488","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-5488"},"summary":{"title":"CVE-2018-5488","description":"NetApp SANtricity Web Services Proxy versions 1.10.x000.0002 through 2.12.X000.0002 and SANtricity Storage Manager 11.30.0X00.0004 through 11.42.0X00.0001 ship with the Java Management Extension Remote Method Invocation (JMX RMI) service bound to the network, and are susceptible to unauthenticated remote code execution.","state":"PUBLIC","assigner":"security-alert@netapp.com","published_at":"2018-06-13 20:29:00","updated_at":"2018-08-11 17:54:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20180612-0001/","name":"https://security.netapp.com/advisory/ntap-20180612-0001/","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"CVE-2018-5488 Unauthenticated Remote Code Execution Vulnerability in SANtricity Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/104462","name":"104462","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"NetApp SANtricity Products CVE-2018-5488 Remote Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-5488","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5488","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"5488","vulnerable":"1","versionEndIncluding":"11.42.0x00.0001","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"santricity_storage_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"5488","vulnerable":"1","versionEndIncluding":"2.12.x000.0002","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"santricity_web_services_proxy","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-alert@netapp.com","DATE_PUBLIC":"2018-06-12T00:00:00","ID":"CVE-2018-5488","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SANtricity Products","version":{"version_data":[{"version_value":"SANtricity Web Services Proxy versions 1.10.x000.0002 through 2.12.X000.0002 and SANtricity Storage Manager 11.30.0X00.0004 through 11.42.0X00.0001"}]}}]},"vendor_name":"NetApp "}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"NetApp SANtricity Web Services Proxy versions 1.10.x000.0002 through 2.12.X000.0002 and SANtricity Storage Manager 11.30.0X00.0004 through 11.42.0X00.0001 ship with the Java Management Extension Remote Method Invocation (JMX RMI) service bound to the network, and are susceptible to unauthenticated remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Unauthenticated Remote Code Execution"}]}]},"references":{"reference_data":[{"name":"104462","refsource":"BID","url":"http://www.securityfocus.com/bid/104462"},{"name":"https://security.netapp.com/advisory/ntap-20180612-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20180612-0001/"}]}},"nvd":{"publishedDate":"2018-06-13 20:29:00","lastModifiedDate":"2018-08-11 17:54:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:santricity_storage_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.30.0x00.0004","versionEndIncluding":"11.42.0x00.0001","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:santricity_web_services_proxy:*:*:*:*:*:*:*:*","versionStartIncluding":"1.10.x000.0002","versionEndIncluding":"2.12.x000.0002","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"5488","Ordinal":"121458","Title":"CVE-2018-5488","CVE":"CVE-2018-5488","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"5488","Ordinal":"1","NoteData":"NetApp SANtricity Web Services Proxy versions 1.10.x000.0002 through 2.12.X000.0002 and SANtricity Storage Manager 11.30.0X00.0004 through 11.42.0X00.0001 ship with the Java Management Extension Remote Method Invocation (JMX RMI) service bound to the network, and are susceptible to unauthenticated remote code execution.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"5488","Ordinal":"2","NoteData":"2018-06-13","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"5488","Ordinal":"3","NoteData":"2018-06-15","Type":"Other","Title":"Modified"}]}}}