9
CVSSv2

CVE-2019-1822

Published: 16/05/2019 Updated: 24/03/2023
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote malicious user to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the malicious user to execute code with root-level privileges on the underlying operating system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco evolved programmable network manager

cisco prime infrastructure

Vendor Advisories

Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow a remote attacker to gain the ability to execute arbitrary code with elevated privileges on the underlying operating system One of these issues, CVE-2019-1821, can be exploited by an u ...

Recent Articles

Good heavens, is it time to patch Cisco kit again? Prime Infrastructure root privileges hole plugged
The Register • Gareth Corfield • 17 May 2019

Do the thing ASAP, you know how it works by now

Among a bumper crop of 57 security issues Cisco divulged on Wednesday was a fix for a trio of vulns, one critical, in networks management tool Prime Infrastructure. The latter potentially allows unauthenticated miscreants to execute arbitrary code with root privileges on PI devices. CVE-2019-1821 "can be exploited by an unauthenticated attacker that has network access to the affected [web] administrative interface," Cisco said in an advisory. Two other related vulns, consecutively numbered CVE-2...