#10427 NIOS Privilege Escalation Vulnerability


A vulnerability in the “support access” feature on Infoblox NIOS could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope.



The vulnerability is due to a weakness in the “support access” password generation algorithm.  A locally authenticated administrative user may be able to exploit this vulnerability if the “support access” feature is enabled, they know the support access code for the current session, and they know the algorithm to generate the support access password from the support access code.  “Support access” is disabled by default. When enabled, the access will be automatically disabled (and support access code will expire) after the 24 hours.


CVE: CVE-2018-10239

First Publication: May 13, 2019

Version 10: Final

CVSS Score: Base 6.5 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:X/RL:X/RC:X


Affected NIOS Versions

NIOS 6.8 - NIOS 8.4.1



The support access code should be closely guarded.

To prevent any potential exposure, Infoblox strongly recommends that support access remain disabled unless requested by Infoblox support as part of an active support request.



Issue has been resolved in NIOS 8.4.2.

Showing results for 
Search instead for 
Do you mean