René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

144 lines
5.1 KiB
JSON

{
"id": "CVE-2019-1586",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2019-05-03T15:29:00.367",
"lastModified": "2021-10-29T16:54:49.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, local attacker with physical access to obtain sensitive information from an affected device. The vulnerability is due to insecure removal of cleartext encryption keys stored on local partitions in the hard drive of an affected device. An attacker could exploit this vulnerability by retrieving data from the physical disk on the affected partition(s). A successful exploit could allow the attacker to retrieve encryption keys, possibly allowing the attacker to further decrypt other data and sensitive information on the device, which could lead to the disclosure of confidential information."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el software Application Policy Infrastructure Controller (APIC) de Cisco, podr\u00eda permitir que un atacante local no identificado con acceso f\u00edsico obtenga informaci\u00f3n confidencial de un dispositivo afectado. La vulnerabilidad es debido a la eliminaci\u00f3n no segura de las claves de cifrado de texto no encriptado almacenadas en particiones locales en el disco duro de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad recuperando datos del disco f\u00edsico en la(s) partici\u00f3n(es) afectada(s). Una operaci\u00f3n \u00e9xito podr\u00eda permitir al atacante recuperar claves de cifrado, posiblemente permitiendo que el atacante descifre otros datos e informaci\u00f3n confidencial en el dispositivo, lo que conllevar\u00eda a la revelaci\u00f3n de informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-459"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-320"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(0.90a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AE5B8D29-9D2B-469B-8854-51B13D8ED25D"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/108158",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}