Логотип exploitDog
bind:CVE-2019-1648
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1648

Количество 3

Количество 3

nvd логотип

CVE-2019-1648

больше 6 лет назад

A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-2249-5x8x-97jc

около 3 лет назад

A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2019-00529

больше 6 лет назад

Уязвимость механизма конфигурации групп пользователей программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю повысить свои привилегии до уровня root и получить полный контроль над устройством

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1648

A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-2249-5x8x-97jc

A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-00529

Уязвимость механизма конфигурации групп пользователей программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю повысить свои привилегии до уровня root и получить полный контроль над устройством

CVSS3: 7.8
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу