Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1648


A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.


Published

2019-01-24T15:29:00.767

Last Modified

2024-11-21T04:37:00.493

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-264
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco vedge_100_firmware * Yes
Hardware cisco vedge_100 - No
Operating System cisco vedge_1000_firmware * Yes
Hardware cisco vedge_1000 - No
Operating System cisco vedge_2000_firmware * Yes
Hardware cisco vedge_2000 - No
Operating System cisco vedge_5000_firmware * Yes
Hardware cisco vedge_5000 - No
Application cisco sd-wan < 18.4.0 Yes
Application cisco vbond_orchestrator - Yes
Application cisco vmanage_network_management - Yes
Application cisco vsmart_controller - Yes

References