{"id": "CVE-2018-8867", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2018-05-18T20:29:00.323", "references": [{"url": "http://www.securityfocus.com/bid/104241", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-01", "tags": ["Mitigation", "Third Party Advisory", "US Government Resource"], "source": "ics-cert@hq.dhs.gov"}, {"url": "http://www.securityfocus.com/bid/104241", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-01", "tags": ["Mitigation", "Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ics-cert@hq.dhs.gov", "description": [{"lang": "en", "value": "CWE-20"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "In GE PACSystems RX3i CPE305/310 version 9.20 and prior, RX3i CPE330 version 9.21 and prior, RX3i CPE 400 version 9.30 and prior, PACSystems RSTi-EP CPE 100 all versions, and PACSystems CPU320/CRU320 RXi all versions, the device does not properly validate input, which could allow a remote attacker to send specially crafted packets causing the device to become unavailable."}, {"lang": "es", "value": "En GE PACSystems RX3i CPE305/310, en versiones 9.20 y anteriores; RX3i CPE330, en versiones 9.21 y anteriores; RX3i CPE 400, en versiones 9.30 y anteriores; PACSystems RSTi-EP CPE 100, en todas las versiones; y PACSystems CPU320/CRU320 RXi, en todas las versiones, el dispositivo no valida correctamente las entradas, lo que podr\u00eda permitir que un atacante remoto env\u00ede paquetes especialmente manipulados que causen que el dispositivo deje de estar disponible."}], "lastModified": "2024-11-21T04:14:29.243", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:pacsystems_rx3i_cpe305_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEC913F0-A45D-43F8-8E52-2A2C8D1F9DA7", "versionEndIncluding": "9.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:pacsystems_rx3i_cpe305:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7E05E2BD-429B-48B3-8BC5-BDC04F686FC1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:pacsystems_rx3i_cpe310_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B0A7230-134E-4BD4-A6E1-B5565958612E", "versionEndIncluding": "9.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:pacsystems_rx3i_cpe310:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2833DB18-A300-498F-BF61-798032151A6B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:rx3i_cpe330_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAC6F7D6-F549-4BE6-9319-EC94DBBCCF66", "versionEndIncluding": "9.21"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:rx3i_cpe330:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "54AF09DD-A113-4849-A7AF-5DBCC1060786"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:rx3i_cpe_400_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75D397D3-5CBD-4917-8FFE-D113BD23546F", "versionEndIncluding": "9.30"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:rx3i_cpe_400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "85B5DF14-24A1-4853-9061-7BAC2A4D6EAD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:pacsystems_rsti-ep_cpe_100_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DE130F6-ECCF-46FE-8C5C-1ED63A3388E2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:pacsystems_rsti-ep_cpe_100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0A0C1686-CCEC-48EE-A2C1-F20C812CE709"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:pacsystems_cpu320_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9ACC02D-C9E9-4A64-880B-BE2773AF096C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:pacsystems_cpu320:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CF3AE4A6-6097-4401-8BEA-F19E07749084"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:pacsystems_cru320_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07F8DA32-1C9C-49B7-91CB-54D9AA9A8FC7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:pacsystems_cru320:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "46995B50-BD8C-4B27-BE4D-25FDD1699E82"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:ge:pacsystems_rxi_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82C67446-CA89-44FE-9032-D8C23FD2A934"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:ge:pacsystems_rxi:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67D9CF9D-9D56-4452-8C7A-8AECF621DA40"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ics-cert@hq.dhs.gov"}