ID CVE-2019-15996 Type cve Reporter cve@mitre.org Modified 2020-10-16T13:32:00
Description
A vulnerability in Cisco DNA Spaces: Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by leveraging the insufficient restrictions to modify sensitive files. A successful exploit could allow the attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root.
{"id": "CVE-2019-15996", "bulletinFamily": "NVD", "title": "CVE-2019-15996", "description": "A vulnerability in Cisco DNA Spaces: Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by leveraging the insufficient restrictions to modify sensitive files. A successful exploit could allow the attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root.", "published": "2019-11-26T04:15:00", "modified": "2020-10-16T13:32:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15996", "reporter": "cve@mitre.org", "references": ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-priv-esca"], "cvelist": ["CVE-2019-15996"], "type": "cve", "lastseen": "2020-12-09T21:41:45", "edition": 9, "viewCount": 43, "enchantments": {"dependencies": {"references": [{"type": "cisco", "idList": ["CISCO-SA-20191120-DNA-PRIV-ESCA"]}], "modified": "2020-12-09T21:41:45", "rev": 2}, "score": {"value": 6.1, "vector": "NONE", "modified": "2020-12-09T21:41:45", "rev": 2}, "vulnersScore": 6.1}, "cpe": [], "affectedSoftware": [{"cpeName": "cisco:dna_spaces\\", "name": "cisco dna spaces\\", "operator": "lt", "version": "2.1"}], "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.8, "impactScore": 5.9}, "cpe23": [], "cwe": ["CWE-78"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:cisco:dna_spaces\\:2.1:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1", "vulnerable": true}], "operator": "OR"}]}}
{"cisco": [{"lastseen": "2020-12-24T11:40:37", "bulletinFamily": "software", "cvelist": ["CVE-2019-15996"], "description": "A vulnerability in Cisco DNA Spaces: Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root.\n\nThe vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by leveraging the insufficient restrictions to modify sensitive files. A successful exploit could allow the attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root.\n\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\nThis advisory is available at the following link:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-priv-esca [\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-priv-esca\"]", "modified": "2019-11-19T16:56:31", "published": "2019-11-20T16:00:00", "id": "CISCO-SA-20191120-DNA-PRIV-ESCA", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-priv-esca", "type": "cisco", "title": "Cisco DNA Spaces: Connector Privilege Escalation Vulnerability", "cvss": {"score": 6.7, "vector": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}}]}