CVE-2019-1625
Published Jun 20, 2019
Last updated 3 years ago
Overview
- Description
- A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
- ykramarz@cisco.com
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3FA1C4A-2DC0-4595-85B9-EDEDB3E159E4", "versionEndExcluding": "18.3.6" }, { "criteria": "cpe:2.3:o:cisco:sd-wan_firmware:18.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47FEFC2B-329C-470E-A4C3-D43FF726BF08" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1" }, { "criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9" }, { "criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711" }, { "criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2" }, { "criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2" }, { "criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3" }, { "criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06" } ], "operator": "OR" } ], "operator": "AND" } ]