// For flags

CVE-2019-1656

Cisco Enterprise NFV Infrastructure Software Linux Shell Access Vulnerability

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the CLI of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to access the shell of the underlying Linux operating system on the affected device. The vulnerability is due to improper input validation in the affected software. An attacker could exploit this vulnerability by sending crafted commands to the affected device. An exploit could allow the attacker to gain shell access with a nonroot user account to the underlying Linux operating system on the affected device and potentially access system configuration files with sensitive information. This vulnerability only affects console connections from CIMC. It does not apply to remote connections, such as telnet or SSH.

Una vulnerabilidad en la interfaz de línea de comandos (CLI) de Cisco Enterprise NFV Infrastructure Software (NFVIS) podría permitir que un atacante remoto autenticado aceda al shell del sistema operativo Linux en el dispositivo afectado. La vulnerabilidad se debe a la insuficiente validación de entradas por parte del software afectado. Un atacante podría explotar esta vulnerabilidad enviando comandos manipulados al dispositivo afectado. Su explotación con éxito podría permitir que el atacante obtenga acceso shell con una cuenta de usuario que no es root al sistema operativo Linux subyacente en el dispositivo afectado y acceda a los archivos de configuración del sistema con información sensible. Esta vulnerabilidad solo afecta a las conexiones de consola desde CIMC. No aplica a las conexiones remotas, como telnet o SSH.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-01-24 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Enterprise Nfv Infrastructure Software
Search vendor "Cisco" for product "Enterprise Nfv Infrastructure Software"
3.9.1
Search vendor "Cisco" for product "Enterprise Nfv Infrastructure Software" and version "3.9.1"
-
Affected