{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T14:40:12.977","vulnerabilities":[{"cve":{"id":"CVE-2018-18995","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2019-01-03T22:29:00.247","lastModified":"2024-11-21T03:57:00.443","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pluto Safety PLC Gateway Ethernet devices ABB GATE-E1 and GATE-E2 all versions do not allow authentication to be configured on administrative telnet or web interfaces, which could enable various effects vectors, including conducting device resets, reading or modifying registers, and changing configuration settings such as IP addresses."},{"lang":"es","value":"Ninguna versión de los dispositivos Pluto Safety PLC Gateway Ethernet ABB GATE-E1 y GATE-E2permite la configuración de la autenticación en interfaces del administrador telnet o web, lo que podría habilitar varios vectores de efectos, incluyendo el restablecimiento de dispositivos, la lectura o modificación de registros y el cambio de los ajustes de configuración, como pueden ser las direcciones IP."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:abb:gate-e1_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"D27F9314-660C-46AC-91A6-14DD2AFB3518"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:abb:gate-e1:-:*:*:*:*:*:*:*","matchCriteriaId":"5DCAE95B-195E-45A9-8A31-591EDCBF3B19"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:abb:gate-e2_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"86C7ACA6-1367-41DB-8E60-D10EC94BAC14"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:abb:gate-e2:-:*:*:*:*:*:*:*","matchCriteriaId":"C567806D-32A0-4A0C-BC55-F4BE4B721441"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106247","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-352-01","source":"ics-cert@hq.dhs.gov","tags":["Mitigation","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/106247","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-352-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory","US Government Resource"]}]}}]}