Логотип exploitDog
bind:CVE-2019-1646
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1646

Количество 3

Количество 3

nvd логотип

CVE-2019-1646

около 7 лет назад

A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local attacker to escalate privileges and modify device configuration files. The vulnerability exists because user input is not properly sanitized for certain commands at the CLI. An attacker could exploit this vulnerability by sending crafted commands to the CLI of an affected device. A successful exploit could allow the attacker to establish an interactive session with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xphx-jp87-55x8

больше 3 лет назад

A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local attacker to escalate privileges and modify device configuration files. The vulnerability exists because user input is not properly sanitized for certain commands at the CLI. An attacker could exploit this vulnerability by sending crafted commands to the CLI of an affected device. A successful exploit could allow the attacker to establish an interactive session with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2019-00530

около 7 лет назад

Уязвимость интерфейса командной строки (Command Line Interface, CLI) программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю повысить свои привилегии и изменить файлы конфигурации устройства

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1646

A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local attacker to escalate privileges and modify device configuration files. The vulnerability exists because user input is not properly sanitized for certain commands at the CLI. An attacker could exploit this vulnerability by sending crafted commands to the CLI of an affected device. A successful exploit could allow the attacker to establish an interactive session with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device.

CVSS3: 7.8
0%
Низкий
около 7 лет назад
github логотип
GHSA-xphx-jp87-55x8

A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local attacker to escalate privileges and modify device configuration files. The vulnerability exists because user input is not properly sanitized for certain commands at the CLI. An attacker could exploit this vulnerability by sending crafted commands to the CLI of an affected device. A successful exploit could allow the attacker to establish an interactive session with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00530

Уязвимость интерфейса командной строки (Command Line Interface, CLI) программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю повысить свои привилегии и изменить файлы конфигурации устройства

CVSS3: 7.8
0%
Низкий
около 7 лет назад

Уязвимостей на страницу