4.3
CVSSv3

CVE-2019-1758

Published: 28/03/2019 Updated: 09/10/2019
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 294
Vector: AV:A/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent malicious user to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path. An attacker could exploit this vulnerability by attempting to connect to the network on an 802.1x configured port. A successful exploit could allow the malicious user to intermittently obtain access to the network.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 15.2\\(1\\)sy7

cisco ios 15.1\\(2\\)sy13

cisco ios 15.3\\(1\\)sy2

cisco ios 15.1\\(1\\)sy2

cisco ios 15.2\\(4\\)jn1

cisco ios 12.2\\(33\\)sxj8

cisco ios 15.1\\(2\\)sy12

cisco ios 15.1\\(3\\)svn2

cisco ios 15.5\\(1\\)sy2

cisco ios 12.2\\(33\\)sxj7

cisco ios 15.4\\(1\\)sy1

cisco ios 15.1\\(3\\)svi1b

cisco ios 15.1\\(2\\)sy1

cisco ios 15.1\\(1\\)sy3

cisco ios 15.1\\(4\\)m12c

cisco ios 12.2\\(33\\)sxj9

cisco ios 15.1\\(2\\)sy10

cisco ios 15.1\\(2\\)sy9

cisco ios 15.1\\(3\\)svp2

cisco ios 15.2\\(3\\)ea1

cisco ios 15.1\\(1\\)sy6

cisco ios 15.4\\(1\\)sy2

cisco ios 12.2\\(60\\)ez12

cisco ios 15.1\\(3\\)svg3d

cisco ios 15.3\\(1\\)sy

cisco ios 15.1\\(2\\)sy4a

cisco ios 15.1\\(1\\)sy4

cisco ios 15.2\\(1\\)sy

cisco ios 15.1\\(2\\)sy2

cisco ios 15.5\\(1\\)sy1

cisco ios 15.1\\(3\\)svk4b

cisco ios 12.2\\(33\\)sxj6

cisco ios 15.1\\(2\\)sy3

cisco ios 15.3\\(3\\)ja1n

cisco ios 15.5\\(1\\)sy

cisco ios 15.6\\(2\\)sp3b

cisco ios 12.2\\(33\\)sxj10

cisco ios 15.1\\(2\\)sy4

cisco ios 15.1\\(3\\)svm3

cisco ios 15.4\\(1\\)sy3

cisco ios 15.2\\(1\\)sy2

cisco ios 15.3\\(3\\)jf35

cisco ios 15.2\\(2\\)sy1

cisco ios 15.3\\(3\\)ji2

cisco ios 15.2\\(1\\)sy1

cisco ios 15.1\\(3\\)svk4c

cisco ios 15.1\\(1\\)sy5

cisco ios 15.2\\(1\\)sy4

cisco ios 15.1\\(2\\)sy

cisco ios 15.1\\(2\\)sy11

cisco ios 15.1\\(3\\)svo2

cisco ios 15.2\\(2\\)sy

cisco ios 15.1\\(2\\)sy7

cisco ios 15.2\\(1\\)sy3

cisco ios 15.2\\(2\\)sy3

cisco ios 15.2\\(4a\\)ea5

cisco ios 15.1\\(1\\)sy1

cisco ios 15.1\\(2\\)sy8

cisco ios 15.4\\(1\\)sy

cisco ios 15.1\\(2\\)sy5

cisco ios 15.2\\(1\\)sy6

cisco ios 15.2\\(1\\)sy5

cisco ios 15.3\\(1\\)sy1

cisco ios 15.2\\(1\\)sy0a

cisco ios 15.1\\(3\\)svo1

cisco ios 15.3\\(0\\)sy

cisco ios 15.2\\(1\\)sy1a

cisco ios 15.2\\(2\\)sy2

cisco ios 15.1\\(2\\)sy6

cisco ios 15.1\\(3\\)svp1

cisco ios 15.1\\(2\\)sg8a

cisco ios 15.4\\(1\\)sy4

Vendor Advisories

A vulnerability in 8021x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent attacker to access the network prior to authentication The vulnerability is due to how the 8021x packets are handled in the process path An attacker could exploit this vulnerability by attempting to connect to th ...