CVE-2019-1648
Cisco SD-WAN Solution Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.
Una vulnerabilidad en la configuración del grupo de usuarios de la solución Cisco SD-WAN podría permitir a un atacante local autenticado obtener privilegios elevados en un dispositivo afectado. La vulnerabilidad se debe a un error a la hora de validar correctamente ciertos parámetros incluidos en la configuración "group". Un atacante podría explotar esta vulnerabilidad escribiendo un archivo manipulado en el directorio donde la configuración "user group" está ubicada en el sistema operativo subyacente. Un exploit exitoso podría permitir que el atacante obtenga privilegios de nivel root y obtenga el control total del dispositivo.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2018-12-06 CVE Reserved
- 2019-01-24 CVE Published
- 2023-03-08 EPSS Updated
- 2024-11-20 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106719 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Vedge 100 Firmware Search vendor "Cisco" for product "Vedge 100 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 100 Search vendor "Cisco" for product "Vedge 100" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Vedge 1000 Firmware Search vendor "Cisco" for product "Vedge 1000 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 1000 Search vendor "Cisco" for product "Vedge 1000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Vedge 2000 Firmware Search vendor "Cisco" for product "Vedge 2000 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 2000 Search vendor "Cisco" for product "Vedge 2000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Vedge 5000 Firmware Search vendor "Cisco" for product "Vedge 5000 Firmware" | * | - |
Affected
| in | Cisco Search vendor "Cisco" | Vedge 5000 Search vendor "Cisco" for product "Vedge 5000" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Sd-wan Search vendor "Cisco" for product "Sd-wan" | < 18.4.0 Search vendor "Cisco" for product "Sd-wan" and version " < 18.4.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Vbond Orchestrator Search vendor "Cisco" for product "Vbond Orchestrator" | - | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Vmanage Network Management Search vendor "Cisco" for product "Vmanage Network Management" | - | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Vsmart Controller Search vendor "Cisco" for product "Vsmart Controller" | - | - |
Affected
|