Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-25237— Hirschmann HiSecOS Buffer Overflow via HTTPS Login

CVSS 9.8 · Critical EPSS 0.10% · P28
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-25237

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Hirschmann HiSecOS Buffer Overflow via HTTPS Login
Source: NVD (National Vulnerability Database)
Vulnerability Description
Hirschmann HiSecOS devices versions prior to 05.3.03 contain a buffer overflow vulnerability in the HTTPS login interface when RADIUS authentication is enabled that allows remote attackers to crash the device or execute arbitrary code by submitting a password longer than 128 characters. Attackers can exploit improper bounds checking in password handling to overflow a fixed-size buffer and achieve denial of service or remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Belden Hirschmann HiSecOS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Belden Hirschmann HiSecOS是美国Belden公司的一个工业网络安全设备操作系统。 Belden Hirschmann HiSecOS 05.3.03之前版本存在安全漏洞,该漏洞源于启用RADIUS身份验证时HTTPS登录接口存在缓冲区溢出,可能导致远程攻击者提交超过128个字符的密码使设备崩溃或执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
BeldenHirschmann HiSecOS Classic Firewall (EAGLE, EAGLE One) 05.3.03 -

II. Public POCs for CVE-2018-25237

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-25237

登录查看更多情报信息。

Same Patch Batch · Belden · 2026-04-03 · 11 CVEs total

CVE-2017-202379.8 CRITICALHirschmann Industrial HiVision Authentication Bypass Remote Code Execution
CVE-2018-252369.8 CRITICALHirschmann HiOS HiSecOS Authentication Bypass via HTTP Management
CVE-2017-202349.8 CRITICALGarrettCom Magnum 6K and 10K Authentication Bypass via Hardcoded String
CVE-2021-44779.1 CRITICALHirschmann HiLCOS OpenBAT BAT450 IPv6 IPsec Firewall Bypass
CVE-2016-150588.1 HIGHHirschmann HiLCOS Classic Platform Password Exposure via SNMP
CVE-2020-372167.5 HIGHHirschmann HiOS EtherNet/IP Stack Denial of Service
CVE-2015-101487.5 HIGHHirschmann HiLCOS Hard-coded Credentials SSH SSL Keys
CVE-2022-49877.3 HIGHHirschmann Industrial HiVision External Application Path Hijacking Leading to Arbitrary Co
CVE-2017-202387.1 HIGHHirschmann Industrial HiVision Improper Authorization Privilege Escalation
CVE-2017-202335.4 MEDIUMHirschmann HiLCOS Layer-2 Firewall Multicast Broadcast Traffic Bypass

IV. Related Vulnerabilities

V. Comments for CVE-2018-25237

No comments yet


Leave a comment