Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-12648


A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.


Published

2019-09-25T20:15:10.477

Last Modified

2024-11-21T04:23:15.463

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    CWE-863

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ios 15.7\(3\)m3 Yes
Hardware cisco 807_industrial_integrated_services_routers - No
Hardware cisco 809_industrial_integrated_services_routers - No
Hardware cisco 829_industrial_integrated_services_routers - No
Hardware cisco cgr_1120 - No
Hardware cisco cgr1240 - No

References