mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
293 lines
11 KiB
JSON
293 lines
11 KiB
JSON
{
|
|
"id": "CVE-2019-12671",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2019-09-25T21:15:11.750",
|
|
"lastModified": "2019-10-09T23:46:02.310",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en la CLI del Software Cisco IOS XE, podr\u00eda permitir a un atacante local autenticado conseguir acceso de shell en un dispositivo afectado y ejecutar comandos sobre el sistema operativo (SO) subyacente. La vulnerabilidad es debido a la aplicaci\u00f3n insuficiente del token de consentimiento en la autorizaci\u00f3n del acceso de shell. Un atacante podr\u00eda explotar esta vulnerabilidad mediante la autenticaci\u00f3n en la CLI y solicitando acceso de shell en un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante conseguir acceso de shell en el dispositivo afectado y ejecutar comandos en el Sistema Operativo subyacente."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.7,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-863"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-285"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2C32E72-009C-4377-8EF0-5090A64450AF"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C24227E-9FF6-4757-A342-958CA4B8BF63"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E529335-18D1-4CEC-A8D5-CC1CA33D64F5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1001-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3072DEFA-61D6-413F-97FD-F64C0E90155C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9FBFB5C-347B-4F73-93BE-4D3137D8F93A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F040372-CDAD-4AC4-9B7C-BFF9658B6BF2"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C33862F1-652A-4F60-BD3E-A6B3733E56A9"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "130205FD-CA31-4E49-B8C4-181840270C70"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "908A56D8-64AF-4813-9D4D-C429C0603A31"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1002-x:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03A2AA1C-7568-4BB6-BBD3-8E03D32CDA1F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53DAF422-7E0B-44EB-AD8D-4643A9711739"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F7F661E-335C-4123-9363-E2E5D51846C1"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:c1117-4p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E93E05E8-32E9-4441-BA6D-FCDC413979BF"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:c1117-4plteea:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0EB9CE31-BA5F-4111-881D-EB8546950BA5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:c1117-4pltela:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1693D321-0465-42D9-A947-4A428F836CDD"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:encs5412\\/k9:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF3E4DCA-455C-4D93-973C-C613781E6406"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:encs5412\\/k9-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "313B08AE-E0ED-43E8-A182-9578CFA1BFD7"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:sasr1k1xucmk9-1610:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8DBC3978-6CA8-46E3-ADFB-0C67E7BAC5CE"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:sasr1k2xucmk9-1610:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38348475-5EFC-471E-B32A-487967F9D479"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:sasr1khxucmk9-1610:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D01ABAC-C744-4A8B-9DAD-EEA9AC01EA56"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:sisr1100ucmk9-1610:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B354F0C-36C4-492F-BE33-B89042F36876"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |