// For flags

CVE-2019-1646

Privilege Escalation Vulnerability in Cisco SD-WAN Solution

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local attacker to escalate privileges and modify device configuration files. The vulnerability exists because user input is not properly sanitized for certain commands at the CLI. An attacker could exploit this vulnerability by sending crafted commands to the CLI of an affected device. A successful exploit could allow the attacker to establish an interactive session with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device.

Una vulnerabilidad en la interfaz de línea de comandos (CLI) local de la solución Cisco SD-WAN podría permitir a un atacante local autenticado escalar privilegios y modificar los archivos de configuración de dispositivo. La vulnerabilidad existe porque las entradas del usuario no se sanean de manera correcta para determinados comandos en la CLI. Un atacante podría explotar esta vulnerabilidad enviando comandos manipulados a la CLI de un dispositivo afectado. Un exploit con éxito podría permitir que el atacante establezca una sesión interactiva con privilegios escalados. Posteriormente, el atacante podría utilizar dichos privilegios elevados para comprometer el dispositivo u obtener datos de configuración adicionales.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-01-24 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Vedge 100 Firmware
Search vendor "Cisco" for product "Vedge 100 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 100
Search vendor "Cisco" for product "Vedge 100"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 1000 Firmware
Search vendor "Cisco" for product "Vedge 1000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 1000
Search vendor "Cisco" for product "Vedge 1000"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 2000 Firmware
Search vendor "Cisco" for product "Vedge 2000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 2000
Search vendor "Cisco" for product "Vedge 2000"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 5000 Firmware
Search vendor "Cisco" for product "Vedge 5000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 5000
Search vendor "Cisco" for product "Vedge 5000"
--
Safe
Cisco
Search vendor "Cisco"
Sd-wan
Search vendor "Cisco" for product "Sd-wan"
< 18.4.0
Search vendor "Cisco" for product "Sd-wan" and version " < 18.4.0"
-
Affected
Cisco
Search vendor "Cisco"
Vbond Orchestrator
Search vendor "Cisco" for product "Vbond Orchestrator"
--
Affected
Cisco
Search vendor "Cisco"
Vmanage Network Management
Search vendor "Cisco" for product "Vmanage Network Management"
--
Affected
Cisco
Search vendor "Cisco"
Vsmart Controller
Search vendor "Cisco" for product "Vsmart Controller"
--
Affected