CVE-2018-11138

CRITICAL KEV RANSOMWARE NUCLEI

Quest Kace System Management Appliance - OS Command Injection

Title source: rule

Description

The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/44950
metasploit WORKING POC EXCELLENT
by Leandro Barragan, Guido Leo, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/quest_kace_systems_management_rce.rb

Nuclei Templates (1)

Quest KACE System Management Appliance 8.0.318 - Remote Code Execution
CRITICALVERIFIEDby ritikchaddha
FOFA: icon_hash="-463230636"

Scores

CVSS v3 9.8
EPSS 0.9344
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-25
VulnCheck KEV 2019-06-13
InTheWild.io 2022-03-25
ENISA EUVD EUVD-2018-3180
Ransomware Use Confirmed
CWE
CWE-78
Status published
Products (1)
quest/kace_system_management_appliance 8.0.318
Published May 31, 2018
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026