Lucene search

K
cvelistCiscoCVELIST:CVE-2019-1757
HistoryMar 27, 2019 - 12:00 a.m.

CVE-2019-1757 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability

2019-03-2700:00:00
CWE-295
cisco
www.cve.org

5.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.8%

A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.

CNA Affected

[
  {
    "product": "Cisco IOS and IOS XE Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "3.6.4E"
      },
      {
        "status": "affected",
        "version": "3.6.5E"
      },
      {
        "status": "affected",
        "version": "3.6.6E"
      },
      {
        "status": "affected",
        "version": "3.6.5aE"
      },
      {
        "status": "affected",
        "version": "3.6.5bE"
      },
      {
        "status": "affected",
        "version": "3.6.7E"
      },
      {
        "status": "affected",
        "version": "3.6.8E"
      },
      {
        "status": "affected",
        "version": "3.6.7aE"
      },
      {
        "status": "affected",
        "version": "3.6.7bE"
      },
      {
        "status": "affected",
        "version": "3.7.4E"
      },
      {
        "status": "affected",
        "version": "3.7.5E"
      },
      {
        "status": "affected",
        "version": "3.16.1S"
      },
      {
        "status": "affected",
        "version": "3.16.1aS"
      },
      {
        "status": "affected",
        "version": "3.16.2S"
      },
      {
        "status": "affected",
        "version": "3.16.2aS"
      },
      {
        "status": "affected",
        "version": "3.16.3S"
      },
      {
        "status": "affected",
        "version": "3.16.2bS"
      },
      {
        "status": "affected",
        "version": "3.16.3aS"
      },
      {
        "status": "affected",
        "version": "3.16.4S"
      },
      {
        "status": "affected",
        "version": "3.16.4aS"
      },
      {
        "status": "affected",
        "version": "3.16.4bS"
      },
      {
        "status": "affected",
        "version": "3.16.4gS"
      },
      {
        "status": "affected",
        "version": "3.16.5S"
      },
      {
        "status": "affected",
        "version": "3.16.4cS"
      },
      {
        "status": "affected",
        "version": "3.16.4dS"
      },
      {
        "status": "affected",
        "version": "3.16.4eS"
      },
      {
        "status": "affected",
        "version": "3.16.6S"
      },
      {
        "status": "affected",
        "version": "3.16.5aS"
      },
      {
        "status": "affected",
        "version": "3.16.5bS"
      },
      {
        "status": "affected",
        "version": "3.16.7S"
      },
      {
        "status": "affected",
        "version": "3.16.6bS"
      },
      {
        "status": "affected",
        "version": "3.16.7aS"
      },
      {
        "status": "affected",
        "version": "3.16.7bS"
      },
      {
        "status": "affected",
        "version": "3.17.0S"
      },
      {
        "status": "affected",
        "version": "3.17.1S"
      },
      {
        "status": "affected",
        "version": "3.17.2S"
      },
      {
        "status": "affected",
        "version": "3.17.1aS"
      },
      {
        "status": "affected",
        "version": "3.17.3S"
      },
      {
        "status": "affected",
        "version": "3.17.4S"
      },
      {
        "status": "affected",
        "version": "16.2.1"
      },
      {
        "status": "affected",
        "version": "16.2.2"
      },
      {
        "status": "affected",
        "version": "3.8.2E"
      },
      {
        "status": "affected",
        "version": "3.8.3E"
      },
      {
        "status": "affected",
        "version": "3.8.4E"
      },
      {
        "status": "affected",
        "version": "3.8.5E"
      },
      {
        "status": "affected",
        "version": "3.8.5aE"
      },
      {
        "status": "affected",
        "version": "3.8.6E"
      },
      {
        "status": "affected",
        "version": "16.3.1"
      },
      {
        "status": "affected",
        "version": "16.3.2"
      },
      {
        "status": "affected",
        "version": "16.3.3"
      },
      {
        "status": "affected",
        "version": "16.3.1a"
      },
      {
        "status": "affected",
        "version": "16.3.4"
      },
      {
        "status": "affected",
        "version": "16.3.5"
      },
      {
        "status": "affected",
        "version": "16.3.5b"
      },
      {
        "status": "affected",
        "version": "16.3.6"
      },
      {
        "status": "affected",
        "version": "16.4.1"
      },
      {
        "status": "affected",
        "version": "16.4.2"
      },
      {
        "status": "affected",
        "version": "16.4.3"
      },
      {
        "status": "affected",
        "version": "16.5.1"
      },
      {
        "status": "affected",
        "version": "16.5.1a"
      },
      {
        "status": "affected",
        "version": "16.5.1b"
      },
      {
        "status": "affected",
        "version": "16.5.2"
      },
      {
        "status": "affected",
        "version": "16.5.3"
      },
      {
        "status": "affected",
        "version": "3.18.0aS"
      },
      {
        "status": "affected",
        "version": "3.18.0S"
      },
      {
        "status": "affected",
        "version": "3.18.1S"
      },
      {
        "status": "affected",
        "version": "3.18.2S"
      },
      {
        "status": "affected",
        "version": "3.18.3S"
      },
      {
        "status": "affected",
        "version": "3.18.4S"
      },
      {
        "status": "affected",
        "version": "3.18.0SP"
      },
      {
        "status": "affected",
        "version": "3.18.1SP"
      },
      {
        "status": "affected",
        "version": "3.18.1aSP"
      },
      {
        "status": "affected",
        "version": "3.18.1gSP"
      },
      {
        "status": "affected",
        "version": "3.18.1bSP"
      },
      {
        "status": "affected",
        "version": "3.18.1cSP"
      },
      {
        "status": "affected",
        "version": "3.18.2SP"
      },
      {
        "status": "affected",
        "version": "3.18.1hSP"
      },
      {
        "status": "affected",
        "version": "3.18.2aSP"
      },
      {
        "status": "affected",
        "version": "3.18.1iSP"
      },
      {
        "status": "affected",
        "version": "3.18.3SP"
      },
      {
        "status": "affected",
        "version": "3.18.4SP"
      },
      {
        "status": "affected",
        "version": "3.18.3aSP"
      },
      {
        "status": "affected",
        "version": "3.18.3bSP"
      },
      {
        "status": "affected",
        "version": "3.9.0E"
      },
      {
        "status": "affected",
        "version": "3.9.1E"
      },
      {
        "status": "affected",
        "version": "3.9.2E"
      },
      {
        "status": "affected",
        "version": "3.9.2bE"
      },
      {
        "status": "affected",
        "version": "16.6.1"
      },
      {
        "status": "affected",
        "version": "16.6.2"
      },
      {
        "status": "affected",
        "version": "16.6.3"
      },
      {
        "status": "affected",
        "version": "16.7.1"
      },
      {
        "status": "affected",
        "version": "16.7.1a"
      },
      {
        "status": "affected",
        "version": "16.7.1b"
      },
      {
        "status": "affected",
        "version": "16.7.2"
      },
      {
        "status": "affected",
        "version": "16.8.1"
      },
      {
        "status": "affected",
        "version": "16.8.1a"
      },
      {
        "status": "affected",
        "version": "16.8.1b"
      },
      {
        "status": "affected",
        "version": "16.8.1s"
      },
      {
        "status": "affected",
        "version": "16.8.1c"
      },
      {
        "status": "affected",
        "version": "16.8.1d"
      },
      {
        "status": "affected",
        "version": "16.8.2"
      },
      {
        "status": "affected",
        "version": "16.9.1b"
      },
      {
        "status": "affected",
        "version": "16.9.1s"
      },
      {
        "status": "affected",
        "version": "16.9.1c"
      },
      {
        "status": "affected",
        "version": "3.10.0E"
      },
      {
        "status": "affected",
        "version": "3.10.1E"
      },
      {
        "status": "affected",
        "version": "3.10.0cE"
      },
      {
        "status": "affected",
        "version": "3.10.1aE"
      },
      {
        "status": "affected",
        "version": "3.10.1sE"
      }
    ]
  }
]

5.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.8%

Related for CVELIST:CVE-2019-1757