From 3c5632654deab016831c428497d8fa31651c4862 Mon Sep 17 00:00:00 2001 From: santosomar Date: Thu, 20 Jun 2019 01:33:35 +0000 Subject: [PATCH] Adding Cisco CVE-2019-1625 --- 2019/1xxx/CVE-2019-1625.json | 77 ++++++++++++++++++++++++++++++++++-- 1 file changed, 73 insertions(+), 4 deletions(-) diff --git a/2019/1xxx/CVE-2019-1625.json b/2019/1xxx/CVE-2019-1625.json index ec5ad9605b7..400d82a7bc9 100644 --- a/2019/1xxx/CVE-2019-1625.json +++ b/2019/1xxx/CVE-2019-1625.json @@ -1,8 +1,34 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2019-06-19T16:00:00-0700", "ID": "CVE-2019-1625", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco SD-WAN Solution Privilege Escalation Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco SD-WAN Solution ", + "version": { + "version_data": [ + { + "affected": "<", + "version_value": "18.3.6" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,8 +37,51 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user. " } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "7.8", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-264" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20190619 Cisco SD-WAN Solution Privilege Escalation Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca" + } + ] + }, + "source": { + "advisory": "cisco-sa-20190619-sdwan-privesca", + "defect": [ + [ + "CSCvi69756" + ] + ], + "discovery": "INTERNAL" } -} \ No newline at end of file +}