Lucene search

K
cve[email protected]CVE-2019-1966
HistoryAug 30, 2019 - 9:15 a.m.

CVE-2019-1966

2019-08-3009:15:20
CWE-264
web.nvd.nist.gov
31
cve-2019-1966
vulnerability
cli command
cisco ucs
fabric interconnect software
local attacker
root privileges
authenticated
local management
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in a specific CLI command within the local management (local-mgmt) context for Cisco UCS Fabric Interconnect Software could allow an authenticated, local attacker to gain elevated privileges as the root user on an affected device. The vulnerability is due to extraneous subcommand options present for a specific CLI command within the local-mgmt context. An attacker could exploit this vulnerability by authenticating to an affected device, entering the local-mgmt context, and issuing a specific CLI command and submitting user input. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid user credentials for the device.

Affected configurations

NVD
Node
cisconx-osRange3.2
OR
cisconx-osMatch4.0
AND
ciscoucs_6248_up_fabric_interconnectMatch-
OR
ciscoucs_6296_up_fabric_interconnectMatch-
OR
ciscoucs_6324_fabric_interconnectMatch-
OR
ciscoucs_6332-16up_fabric_interconnectMatch-
OR
ciscoucs_6332_fabric_interconnectMatch-
OR
ciscoucs_6454_fabric_interconnectMatch-
Node
ciscounified_computing_systemMatch3.2\(3b\)a
OR
ciscounified_computing_systemMatch4.0\(1a\)a

CNA Affected

[
  {
    "product": "Cisco Unified Computing System (Managed) ",
    "vendor": "Cisco",
    "versions": [
      {
        "lessThan": "4.0(2a)",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2019-1966