cvelist/2020/3xxx/CVE-2020-3219.json

86 lines
3.0 KiB
JSON
Raw Normal View History

2019-12-12 18:01:01 +00:00
{
"CVE_data_meta": {
2020-06-03 17:12:37 +00:00
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-06-03T16:00:00",
2019-12-12 18:01:01 +00:00
"ID": "CVE-2020-3219",
2020-06-03 17:12:37 +00:00
"STATE": "PUBLIC",
"TITLE": "Cisco IOS XE Software Web UI Command Injection Vulnerability"
2019-12-12 18:01:01 +00:00
},
2020-06-03 17:12:37 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE Software 16.1.1",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-12-12 18:01:01 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-06-03 18:01:30 +00:00
"value": "A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with administrative privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input to the web UI. A successful exploit could allow an attacker to execute arbitrary commands with administrative privileges on an affected device."
2019-12-12 18:01:01 +00:00
}
]
2020-06-03 17:12:37 +00:00
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "8.8",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200603 Cisco IOS XE Software Web UI Command Injection Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj2-fOnjk2LD"
}
]
},
"source": {
"advisory": "cisco-sa-web-cmdinj2-fOnjk2LD",
"defect": [
[
"CSCvq32594"
]
],
"discovery": "INTERNAL"
2019-12-12 18:01:01 +00:00
}
2020-06-03 18:01:30 +00:00
}