Published on May 17th, 2019 📆 | 8563 Views ⚑
0Cisco Prime Infrastructure/Evolved Programmable Network Web-based Management Interface privilege escalation
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
8.8 | $5k-$25k |
A vulnerability was found in Cisco Prime Infrastructure and Evolved Programmable Network (Network Management Software) (affected version unknown). It has been declared as critical. Affected by this vulnerability is a code block of the component Web-based Management Interface. The manipulation with an unknown input leads to a privilege escalation vulnerability. The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
The weakness was presented 05/16/2019. This vulnerability is known as CVE-2019-1822 since 12/06/2018. The attack can be launched remotely. A single authentication is necessary for exploitation. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 05/16/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
See 135129, 135130, 135131 and 135132 for similar entries.
Vendor
Name
VulDB Meta Base Score: 8.8
VulDB Meta Temp Score: 8.8
VulDB Base Score: 8.8
VulDB Temp Score: 8.8
VulDB Vector: ?
VulDB Reliability: ?
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation (CWE-269)
Local: No
Remote: Yes
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?12/06/2018 CVE assigned
05/16/2019 Advisory disclosed
05/16/2019 VulDB entry created
05/16/2019 VulDB last updateCVE: CVE-2019-1822 (?)
See also: ?Created: 05/16/2019 01:59 PM
Complete: ?
Comments
Download the whitepaper to learn more about our service!
https://vuldb.com/?id.135133
No comments yet. Please log in to comment.