CVE-2019-1688

Published Feb 12, 2019

Last updated 2 years ago

Overview

Description
A vulnerability in the management web interface of Cisco Network Assurance Engine (NAE) could allow an unauthenticated, local attacker to gain unauthorized access or cause a Denial of Service (DoS) condition on the server. The vulnerability is due to a fault in the password management system of NAE. An attacker could exploit this vulnerability by authenticating with the default administrator password via the CLI of an affected server. A successful exploit could allow the attacker to view potentially sensitive information or bring the server down, causing a DoS condition. This vulnerability affects Cisco Network Assurance Engine (NAE) Release 3.0(1). The default password condition only affects new installations of Release 3.0(1).
Source
ykramarz@cisco.com
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Primary
Base score
7.1
Impact score
5.2
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Severity
HIGH

CVSS 3.0

Type
Secondary
Base score
7.7
Impact score
5.2
Exploitability score
2.5
Vector string
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
5.6
Impact score
7.8
Exploitability score
3.9
Vector string
AV:L/AC:L/Au:N/C:P/I:N/A:C

Weaknesses

nvd@nist.gov
CWE-798
ykramarz@cisco.com
CWE-798

Configurations