Lucene search

K
cve[email protected]CVE-2019-1883
HistoryAug 21, 2019 - 7:15 p.m.

CVE-2019-1883

2019-08-2119:15:14
CWE-78
web.nvd.nist.gov
23
cve-2019-1883
cisco
imc
vulnerability
cli
root privilege escalation
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.2%

A vulnerability in the command-line interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker with read-only credentials to inject arbitrary commands that could allow them to obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input on the command-line interface. An attacker could exploit this vulnerability by authenticating with read-only privileges via the CLI of an affected device and submitting crafted input to the affected commands. A successful exploit could allow an attacker to execute arbitrary commands on the device with root privileges.

Affected configurations

NVD
Node
ciscounified_computing_systemMatch4.0\(1c\)hs3
Node
ciscointegrated_management_controller_supervisorRange3.0.0.03.0\(4k\)
OR
ciscointegrated_management_controller_supervisorRange4.0.0.04.0\(4b\)
AND
ciscoencs_5100Match-
OR
ciscoencs_5400Match-
OR
ciscoucs-e1120d-m3Match-
OR
ciscoucs-e140s-m2Match-
OR
ciscoucs-e160d-m2Match-
OR
ciscoucs-e160s-m3Match-
OR
ciscoucs-e168d-m2Match-
OR
ciscoucs-e180d-m3Match-
OR
ciscoucs_c125_m5Match-
OR
ciscoucs_c4200Match-
OR
ciscoucs_s3260Match-
Node
ciscointegrated_management_controller_supervisorRange4.0.0.04.0\(2f\)
AND
ciscoencs_5100Match-
OR
ciscoencs_5400Match-
OR
ciscoucs-e1120d-m3Match-
OR
ciscoucs-e140s-m2Match-
OR
ciscoucs-e160d-m2Match-
OR
ciscoucs-e160s-m3Match-
OR
ciscoucs-e168d-m2Match-
OR
ciscoucs-e180d-m3Match-
OR
ciscoucs_c125_m5Match-
OR
ciscoucs_c4200Match-
OR
ciscoucs_s3260Match-

CNA Affected

[
  {
    "product": "Cisco Unified Computing System E-Series Software (UCSE) ",
    "vendor": "Cisco",
    "versions": [
      {
        "lessThan": "3.0(4k)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.2%

Related for CVE-2019-1883