// For flags

CVE-2019-12648

Cisco IOx for IOS Software Guest Operating System Unauthorized Access Vulnerability

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.

Una vulnerabilidad en el entorno de la aplicación IOx para Software Cisco IOS, podría permitir a un atacante remoto autenticado conseguir acceso no autorizado al Sistema Operativo Invitado (SO Invitado) que es ejecutado en un dispositivo afectado. La vulnerabilidad es debido a una evaluación incorrecta del control de acceso basado en roles (RBAC) cuando un usuario poco privilegiado solicita acceso a un SO Invitado que debe ser restringida a cuentas administrativas. Un atacante podría explotar esta vulnerabilidad mediante la autenticación en el Sistema Operativo Invitado mediante el empleo de las credenciales de un usuario poco privilegiado. Una explotación podría permitir al atacante conseguir acceso no autorizado al sistema operativo invitado como un usuario root.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-06-04 CVE Reserved
  • 2019-09-25 CVE Published
  • 2023-11-04 EPSS Updated
  • 2024-11-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.7\(3\)m3
Search vendor "Cisco" for product "Ios" and version "15.7\(3\)m3"
-
Affected
in Cisco
Search vendor "Cisco"
807 Industrial Integrated Services Routers
Search vendor "Cisco" for product "807 Industrial Integrated Services Routers"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.7\(3\)m3
Search vendor "Cisco" for product "Ios" and version "15.7\(3\)m3"
-
Affected
in Cisco
Search vendor "Cisco"
809 Industrial Integrated Services Routers
Search vendor "Cisco" for product "809 Industrial Integrated Services Routers"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.7\(3\)m3
Search vendor "Cisco" for product "Ios" and version "15.7\(3\)m3"
-
Affected
in Cisco
Search vendor "Cisco"
829 Industrial Integrated Services Routers
Search vendor "Cisco" for product "829 Industrial Integrated Services Routers"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.7\(3\)m3
Search vendor "Cisco" for product "Ios" and version "15.7\(3\)m3"
-
Affected
in Cisco
Search vendor "Cisco"
Cgr 1120
Search vendor "Cisco" for product "Cgr 1120"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.7\(3\)m3
Search vendor "Cisco" for product "Ios" and version "15.7\(3\)m3"
-
Affected
in Cisco
Search vendor "Cisco"
Cgr1240
Search vendor "Cisco" for product "Cgr1240"
--
Safe