Search for vulnerabilities
Vulnerability details: VCID-4cd9-j7dj-aaad
Vulnerability ID VCID-4cd9-j7dj-aaad
Aliases CVE-2018-1000500
Summary Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".
Status Published
Exploitability 0.5
Weighted Severity 7.3
Risk 3.6
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 6.5 http://lists.busybox.net/pipermail/busybox/2018-May/086462.html
generic_textual Medium http://lists.busybox.net/pipermail/busybox/2018-May/086462.html
ssvc Track* http://lists.busybox.net/pipermail/busybox/2018-May/086462.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000500.html
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000500.json
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00485 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00670 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00670 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00670 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00670 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00678 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00679 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00884 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.00902 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
epss 0.02545 https://api.first.org/data/v1/epss?cve=CVE-2018-1000500
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1595611
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000500
cvssv3 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.5 https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
ssvc Track* https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
generic_textual Medium https://git.busybox.net/busybox/tree/networking/wget.c?id=8bc418f07eab79a9c8d26594629799f6157a9466#n74
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
cvssv3.1 8.1 https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
generic_textual Medium https://ubuntu.com/security/notices/USN-4531-1
cvssv3.1 6.5 https://usn.ubuntu.com/4531-1/
ssvc Track* https://usn.ubuntu.com/4531-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at http://lists.busybox.net/pipermail/busybox/2018-May/086462.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:30:36Z/ Found at http://lists.busybox.net/pipermail/busybox/2018-May/086462.html
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000500.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:30:36Z/ Found at https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://usn.ubuntu.com/4531-1/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:30:36Z/ Found at https://usn.ubuntu.com/4531-1/
Exploit Prediction Scoring System (EPSS)
Percentile 0.64261
EPSS Score 0.00485
Published At June 10, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.