Published on May 17th, 2019 📆 | 1946 Views ⚑
0Cisco Prime Infrastructure/Evolved Programmable Network Web-based Management Interface privilege escalation
https://www.ispeech.org/text.to.speech
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
8.8 | $5k-$25k |
A vulnerability was found in Cisco Prime Infrastructure and Evolved Programmable Network (Network Management Software) (version unknown). It has been classified as critical. Affected is code of the component Web-based Management Interface. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
The weakness was disclosed 05/16/2019. This vulnerability is traded as CVE-2019-1821 since 12/06/2018. It is possible to launch the attack remotely. A single authentication is required for exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 05/16/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The entries 135129, 135130, 135131 and 135133 are pretty similar.
Vendor
Name
VulDB Meta Base Score: 8.8
VulDB Meta Temp Score: 8.8
VulDB Base Score: 8.8
VulDB Temp Score: 8.8
VulDB Vector: ?
VulDB Reliability: ?
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation (CWE-269)
Local: No
Remote: Yes
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
0-Day Time: ?12/06/2018 CVE assigned
05/16/2019 Advisory disclosed
05/16/2019 VulDB entry created
05/16/2019 VulDB last updateCVE: CVE-2019-1821 (?)
See also: ?Created: 05/16/2019 01:59 PM
Complete: ?
Comments
Enable the mail alert feature now!
https://vuldb.com/?id.135132
No comments yet. Please log in to comment.