CVE-2019-1854
Cisco Expressway Series Directory Traversal Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the management web interface of Cisco Expressway Series could allow an authenticated, remote attacker to perform a directory traversal attack against an affected device. The vulnerability is due to insufficient input validation on the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to bypass security restrictions and access the web interface of a Cisco Unified Communications Manager associated with the affected device. Valid credentials would still be required to access the Cisco Unified Communications Manager interface.
Una vulnerabilidad en la interfaz web de gestión de Cisco Expressway Series podría permitir a un atacante remoto autenticado realizar un ataque de salto de directorio contra un dispositivo afectado. La vulnerabilidad se debe a una validación insuficiente de entrada en la interfaz web. Un atacante podría explotar esta vulnerabilidad enviando una petición HTTP a la interfaz web. Un exploit exitoso podría permitir al atacante eludir las restricciones de seguridad y acceder a la interfaz web de un Cisco Unified Communications Manager asociado con el dispositivo afectado. Se necesitarían credenciales válidas para acceder a la interfaz de Cisco Unified Communications Manager.
Cisco Expressway Gateway version 11.5.1 suffers from a directory traversal vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-06 CVE Reserved
- 2019-05-03 CVE Published
- 2024-04-24 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/152963/Cisco-Expressway-Gateway-11.5.1-Directory-Traversal.html | X_refsource_misc | |
http://seclists.org/fulldisclosure/2019/May/28 | Mailing List | |
http://www.securityfocus.com/bid/108154 | Vdb Entry | |
https://seclists.org/bugtraq/2019/May/49 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Telepresence Video Communication Server Search vendor "Cisco" for product "Telepresence Video Communication Server" | x8.11.4 Search vendor "Cisco" for product "Telepresence Video Communication Server" and version "x8.11.4" | - |
Affected
|