Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU49772
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1285
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Simphony Server (Apache log4net) component in Oracle Hospitality Simphony. A remote non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
MitigationInstall update from vendor's website.
Vulnerable software versionsXPS 15 9575 2-in-1: before 16.8.4.1011
XPS 13 9370: before 16.8.4.1011
Wyse 7040 Thin Client: before 16.8.4.1011
Vostro 3669: before 16.8.4.1011
Vostro 3668: before 16.8.4.1011
Vostro 3667: before 16.8.4.1011
Vostro 3660: before 16.8.4.1011
Vostro 3268: before 16.8.4.1011
Vostro 3267: before 16.8.4.1011
Precision 5530 2-in-1: before 16.8.4.1011
Precision 5510: before 16.8.4.1011
Precision 3620 Tower: before 16.8.4.1011
Precision 3510: before 16.8.4.1011
Precision 3420 Tower: before 16.8.4.1011
OptiPlex 7440 All-In-One: before 16.8.4.1011
OptiPlex 7040: before 16.8.4.1011
OptiPlex 5040: before 16.8.4.1011
OptiPlex 3240 All-in-One: before 16.8.4.1011
OptiPlex 3046: before 16.8.4.1011
OptiPlex 3040: before 16.8.4.1011
Latitude E7470: before 16.8.4.1011
Latitude E7270: before 16.8.4.1011
Latitude E5570: before 16.8.4.1011
Latitude E5470: before 16.8.4.1011
Latitude E5270: before 16.8.4.1011
Latitude 7480: before 16.8.4.1011
Latitude 7414: before 16.8.4.1011
Latitude 7380: before 16.8.4.1011
Latitude 7370: before 16.8.4.1011
Latitude 7280: before 16.8.4.1011
Latitude 7275 2-in-1: before 16.8.4.1011
Latitude 7214 Rugged Extreme: before 16.8.4.1011
Latitude 7212 Rugged Extreme Tablet: before 16.8.4.1011
Latitude 5580: before 16.8.4.1011
Latitude 5488: before 16.8.4.1011
Latitude 5480: before 16.8.4.1011
Latitude 5288: before 16.8.4.1011
Latitude 5280: before 16.8.4.1011
Latitude 3390: before 16.8.4.1011
Latitude 3379: before 16.8.4.1011
Latitude 14 Rugged 5414: before 16.8.4.1011
Latitude 13 3380: before 16.8.4.1011
Inspiron 15 3567: before 16.8.4.1011
Embedded Box PC 5000: before 16.8.4.1011
Latitude 3580: before 16.8.4.1011
Latitude 3480: before 16.8.4.1011
External linksQ & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.