2025-01-26 03:03:52 +00:00

203 lines
6.9 KiB
JSON

{
"id": "CVE-2019-1626",
"sourceIdentifier": "psirt@cisco.com",
"published": "2019-06-20T03:15:11.433",
"lastModified": "2024-11-21T04:36:57.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de usuario basada en web (Web UI) de vManage de SD-WAN Solution de Cisco, podr\u00eda permitir a un atacante remoto autenticado obtener privilegios elevados en un dispositivo vManage afectado. Una vulnerabilidad es debido a un fallo al no autorizar apropiadamente ciertas acciones del usuario en la configuraci\u00f3n del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad iniciando sesi\u00f3n en la interfaz de usuario web de vManage y enviando peticiones HTTP creadas hacia vManage. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a los atacantes obtener privilegios elevados y realizar cambios en la configuraci\u00f3n que regularmente no estar\u00edan autorizados a realizar."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18.3.6",
"matchCriteriaId": "34DA4069-51E1-41F3-8643-E7436C0DAC6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D71E4AF-6E91-4493-A591-4D056D0E59C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F718A859-BCDB-4DD0-819D-60ABE710F0A9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07E7851F-3E72-4677-B907-CF777EBED2FF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52EEF288-492C-4CE6-A082-631005C5E711"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C5E2C9-7D4B-405C-93DD-33DF265131E2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/108838",
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal",
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/108838",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}