Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1626


A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make.


Published

2019-06-20T03:15:11.433

Last Modified

2024-11-21T04:36:57.660

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-264
  • Type: Primary
    CWE-863

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco sd-wan_firmware ≤ 18.3.6 Yes
Hardware cisco vedge-100 - No
Hardware cisco vedge-1000 - No
Hardware cisco vedge-100b - No
Hardware cisco vedge-2000 - No
Hardware cisco vedge-5000 - No
Hardware cisco vedge_100m - No
Hardware cisco vedge_100wm - No

References