CVE-2018-11138
CRITICAL KEV RANSOMWARE NUCLEIQuest Kace System Management Appliance - OS Command Injection
Title source: ruleDescription
The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/44950
metasploit
WORKING POC
EXCELLENT
by Leandro Barragan, Guido Leo, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/quest_kace_systems_management_rce.rb
Nuclei Templates (1)
Quest KACE System Management Appliance 8.0.318 - Remote Code Execution
CRITICALVERIFIEDby ritikchaddha
FOFA:
icon_hash="-463230636"
References (3)
Scores
CVSS v3
9.8
EPSS
0.9344
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-03-25
VulnCheck KEV
2019-06-13
InTheWild.io
2022-03-25
ENISA EUVD
EUVD-2018-3180
Ransomware Use
Confirmed
CWE
CWE-78
Status
published
Products (1)
quest/kace_system_management_appliance
8.0.318
Published
May 31, 2018
KEV Added
Mar 25, 2022
Tracked Since
Feb 18, 2026