CVE-2018-1000049
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
09/02/2018
Last modified:
30/07/2020
Description
Nanopool Claymore Dual Miner version 7.3 and earlier contains a remote code execution vulnerability by abusing the miner API. The flaw can be exploited only if the software is executed with read/write mode enabled.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:nanopool:claymore_dual_miner:*:*:*:*:*:*:*:* | 7.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/147678/Nanopool-Claymore-Dual-Miner-7.3-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/148578/Nanopool-Claymore-Dual-Miner-APIs-Remote-Code-Execution.html
- http://www.rapid7.com/db/modules/exploit/multi/misc/claymore_dual_miner_remote_manager_rce
- https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2018/1000xxx/CVE-2018-1000049.json
- https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution
- https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/
- https://twitter.com/ReverseBrain/status/951850534985662464
- https://www.exploit-db.com/exploits/44638/
- https://www.exploit-db.com/exploits/45044/