Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-1648

Опубликовано: 24 янв. 2019
Источник: nvd
CVSS3: 7.8
CVSS3: 7.8
CVSS2: 7.2
EPSS Низкий

Описание

A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*
Конфигурация 5

Одно из

cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*
Версия до 18.4.0 (исключая)
cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*

EPSS

Процентиль: 20%
0.00063
Низкий

7.8 High

CVSS3

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-264
CWE-20

Связанные уязвимости

CVSS3: 7.8
github
около 3 лет назад

A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

CVSS3: 7.8
fstec
больше 6 лет назад

Уязвимость механизма конфигурации групп пользователей программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю повысить свои привилегии до уровня root и получить полный контроль над устройством

EPSS

Процентиль: 20%
0.00063
Низкий

7.8 High

CVSS3

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-264
CWE-20