Vulnerability CVE-2019-1648


Published: 2019-01-24

Description:
A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Cisco -> Vbond orchestrator 
Cisco -> Vmanage network management 
Cisco -> Vsmart controller 
Cisco -> Vedge 1000 firmware 
Cisco -> Vedge 100 firmware 
Cisco -> Vedge 2000 firmware 
Cisco -> Vedge 5000 firmware 
Cisco -> Sd-wan 

 References:
http://www.securityfocus.com/bid/106719
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-sol-escal

Copyright 2024, cxsecurity.com

 

Back to Top