CVE-2019-1742
Published Mar 28, 2019
Last updated 4 years ago
Overview
- Description
- A vulnerability in the web UI of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access sensitive configuration information. The vulnerability is due to improper access control to files within the web UI. An attacker could exploit this vulnerability by sending a malicious request to an affected device. A successful exploit could allow the attacker to gain access to sensitive configuration information.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
- ykramarz@cisco.com
- CWE-16
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52BC2A87-31EC-4E15-86E3-ECBEFA9E479A" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D" } ], "operator": "OR" } ] } ]