Vulnerability Description
A privilege escalation vulnerability in the "support access" feature on Infoblox NIOS 6.8 through 8.4.1 could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope. The vulnerability is due to a weakness in the "support access" password generation algorithm. A locally authenticated administrative user may be able to exploit this vulnerability if the "support access" feature is enabled, they know the support access code for the current session, and they know the algorithm to generate the support access password from the support access code. "Support access" is disabled by default. When enabled, the access will be automatically disabled (and support access code will expire) after the 24 hours.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Infoblox | Nios | >= 6.8, <= 8.4.1 |
Related Weaknesses (CWE)
References
- https://community.infoblox.com/t5/Security-Blog/10427-NIOS-Privilege-Escalation-Vendor Advisory
- https://community.infoblox.com/t5/Security-Blog/10427-NIOS-Privilege-Escalation-Vendor Advisory
FAQ
What is CVE-2018-10239?
CVE-2018-10239 is a vulnerability with a CVSS score of 6.7 (MEDIUM). A privilege escalation vulnerability in the "support access" feature on Infoblox NIOS 6.8 through 8.4.1 could allow a locally authenticated administrator to temporarily gain additional privileges on a...
How severe is CVE-2018-10239?
CVE-2018-10239 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10239?
Check the references section above for vendor advisories and patch information. Affected products include: Infoblox Nios.