Логотип exploitDog
bind:CVE-2019-12648
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12648

Количество 3

Количество 3

nvd логотип

CVE-2019-12648

больше 6 лет назад

A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-hfqm-f33h-w94m

больше 3 лет назад

A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2019-03425

больше 6 лет назад

Уязвимость в среде приложения IOx для операционной системы Cisco IOS, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12648

A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.

CVSS3: 8.8
1%
Низкий
больше 6 лет назад
github логотип
GHSA-hfqm-f33h-w94m

A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03425

Уязвимость в среде приложения IOx для операционной системы Cisco IOS, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 9.9
1%
Низкий
больше 6 лет назад

Уязвимостей на страницу