CVE-2019-1646
Privilege Escalation Vulnerability in Cisco SD-WAN Solution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local attacker to escalate privileges and modify device configuration files. The vulnerability exists because user input is not properly sanitized for certain commands at the CLI. An attacker could exploit this vulnerability by sending crafted commands to the CLI of an affected device. A successful exploit could allow the attacker to establish an interactive session with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device.
Una vulnerabilidad en la interfaz de línea de comandos (CLI) local de la solución Cisco SD-WAN podría permitir a un atacante local autenticado escalar privilegios y modificar los archivos de configuración de dispositivo. La vulnerabilidad existe porque las entradas del usuario no se sanean de manera correcta para determinados comandos en la CLI. Un atacante podría explotar esta vulnerabilidad enviando comandos manipulados a la CLI de un dispositivo afectado. Un exploit con éxito podría permitir que el atacante establezca una sesión interactiva con privilegios escalados. Posteriormente, el atacante podría utilizar dichos privilegios elevados para comprometer el dispositivo u obtener datos de configuración adicionales.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2018-12-06 CVE Reserved
- 2019-01-24 CVE Published
- 2023-03-08 EPSS Updated
- 2024-11-20 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106723 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Vedge 100 Firmware Search vendor "Cisco" for product "Vedge 100 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 100 Search vendor "Cisco" for product "Vedge 100" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Vedge 1000 Firmware Search vendor "Cisco" for product "Vedge 1000 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 1000 Search vendor "Cisco" for product "Vedge 1000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Vedge 2000 Firmware Search vendor "Cisco" for product "Vedge 2000 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 2000 Search vendor "Cisco" for product "Vedge 2000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Vedge 5000 Firmware Search vendor "Cisco" for product "Vedge 5000 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 5000 Search vendor "Cisco" for product "Vedge 5000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Sd-wan Search vendor "Cisco" for product "Sd-wan" | < 18.4.0 Search vendor "Cisco" for product "Sd-wan" and version " < 18.4.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Vbond Orchestrator Search vendor "Cisco" for product "Vbond Orchestrator" | - | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Vmanage Network Management Search vendor "Cisco" for product "Vmanage Network Management" | - | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Vsmart Controller Search vendor "Cisco" for product "Vsmart Controller" | - | - |
Affected
|