Miggo Logo

CVE-2018-18325:
Inadequate Encryption Strength in DotNetNuke

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.98857%
Published
7/5/2019
Updated
2/1/2023
KEV Status
Yes
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
DotNetNuke.Corenuget< 9.3.09.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (CVE-2018-18325) explicitly references inadequate encryption strength in parameter protection, which aligns with DNN's parameter encryption/decryption flow. The mention of an incomplete fix for CVE-2018-15811 (which involved 3DES vulnerabilities) suggests persistent issues in the CryptographyProvider class. These functions handle sensitive parameter operations and would be the logical location for cryptographic implementation flaws. The high confidence comes from the direct match between the vulnerability description and the core encryption/decryption mechanisms in DNN's security layer.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*NN (*k* *otN*tNuk*) *.* t*rou** *.*.* us*s * w**k *n*ryption *l*orit*m to prot**t input p*r*m*t*rs. NOT*: t*is issu* *xists ****us* o* *n in*ompl*t* *ix *or *V*-****-*****.

Reasoning

T** vuln*r**ility (*V*-****-*****) *xpli*itly r***r*n**s in***qu*t* *n*ryption str*n*t* in p*r*m*t*r prot**tion, w*i** *li*ns wit* *NN's p*r*m*t*r *n*ryption/***ryption *low. T** m*ntion o* *n in*ompl*t* *ix *or *V*-****-***** (w*i** involv** ***S vu