First published: Mon Dec 17 2018(Updated: )
A privilege escalation issue was discovered in VyOS 1.1.8. The default configuration also allows operator users to execute the pppd binary with elevated (sudo) permissions. Certain input parameters are not properly validated. A malicious operator user can run the binary with elevated permissions and leverage its improper input validation condition to spawn an attacker-controlled shell with root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vyos | =1.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-18556 is considered high due to the potential for privilege escalation.
To fix CVE-2018-18556, upgrade to a patched version of VyOS that addresses the privilege escalation issue.
Users of VyOS version 1.1.8 are affected by CVE-2018-18556.
CVE-2018-18556 is a privilege escalation vulnerability.
Yes, a malicious operator user can exploit CVE-2018-18556 to gain elevated permissions.