{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T09:19:26.510","vulnerabilities":[{"cve":{"id":"CVE-2018-19012","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2019-01-28T21:29:00.253","lastModified":"2024-11-21T03:57:09.830","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Drager Infinity Delta, Infinity Delta, all versions, Delta XL, all versions, Kappa, all version, and Infinity Explorer C700, all versions. Via a specific dialog it is possible to break out of the kiosk mode and reach the underlying operating system. By breaking out of the kiosk mode, an attacker is able to take control of the operating system."},{"lang":"es","value":"Todas las versiones de los siguientes programas de Drager Infinity Delta: Infinity Delta, Delta XL, Kappa y Infinity Explorer C700. Es posible salir del modo \"kiosk\" mediante un diálogo específico y lograr llegar al sistema operativo subyacente.  La salida del modo \"kiosk\" permite al atacante tomar el control del sistema operativo."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:draeger:kappa_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"A7808691-D8D7-4BE0-995C-836980A21683"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:draeger:kappa:-:*:*:*:*:*:*:*","matchCriteriaId":"ED40C0B7-16B1-40F9-8BB4-A663DD969746"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:draeger:infinity_explorer_c700_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"ACD85169-9127-4017-99BF-A862540358FD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:draeger:infinity_explorer_c700:-:*:*:*:*:*:*:*","matchCriteriaId":"23628C4D-D7CD-46C1-B3E7-097D68EB689B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:draeger:delta_xl_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"3D620EF1-5976-4F2D-B56D-ACE14A4A92C9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:draeger:delta_xl:-:*:*:*:*:*:*:*","matchCriteriaId":"1B3D2079-9DCB-4218-8DF9-E33485D7402A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:draeger:infinity_delta_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"4AF77F47-64CB-44D6-A715-A88E88F5ED4C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:draeger:infinity_delta:-:*:*:*:*:*:*:*","matchCriteriaId":"882CC533-800F-4813-A4C2-1F4A72724A57"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106683","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-19-022-01","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/106683","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-19-022-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}