// For flags

CVE-2019-1648

Cisco SD-WAN Solution Privilege Escalation Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

Una vulnerabilidad en la configuración del grupo de usuarios de la solución Cisco SD-WAN podría permitir a un atacante local autenticado obtener privilegios elevados en un dispositivo afectado. La vulnerabilidad se debe a un error a la hora de validar correctamente ciertos parámetros incluidos en la configuración "group". Un atacante podría explotar esta vulnerabilidad escribiendo un archivo manipulado en el directorio donde la configuración "user group" está ubicada en el sistema operativo subyacente. Un exploit exitoso podría permitir que el atacante obtenga privilegios de nivel root y obtenga el control total del dispositivo.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-01-24 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Vedge 100 Firmware
Search vendor "Cisco" for product "Vedge 100 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 100
Search vendor "Cisco" for product "Vedge 100"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 1000 Firmware
Search vendor "Cisco" for product "Vedge 1000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 1000
Search vendor "Cisco" for product "Vedge 1000"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 2000 Firmware
Search vendor "Cisco" for product "Vedge 2000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 2000
Search vendor "Cisco" for product "Vedge 2000"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 5000 Firmware
Search vendor "Cisco" for product "Vedge 5000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 5000
Search vendor "Cisco" for product "Vedge 5000"
--
Safe
Cisco
Search vendor "Cisco"
Sd-wan
Search vendor "Cisco" for product "Sd-wan"
< 18.4.0
Search vendor "Cisco" for product "Sd-wan" and version " < 18.4.0"
-
Affected
Cisco
Search vendor "Cisco"
Vbond Orchestrator
Search vendor "Cisco" for product "Vbond Orchestrator"
--
Affected
Cisco
Search vendor "Cisco"
Vmanage Network Management
Search vendor "Cisco" for product "Vmanage Network Management"
--
Affected
Cisco
Search vendor "Cisco"
Vsmart Controller
Search vendor "Cisco" for product "Vsmart Controller"
--
Affected