9
CVSSv2

CVE-2019-1862

Published: 13/05/2019 Updated: 15/05/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the web-based user interface (Web UI) of Cisco IOS XE Software could allow an authenticated, remote malicious user to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerability occurs because the affected software improperly sanitizes user-supplied input. An attacker who has valid administrator access to an affected device could exploit this vulnerability by supplying a crafted input parameter on a form in the Web UI and then submitting that form. A successful exploit could allow the malicious user to run arbitrary commands on the device with root privileges, which may lead to complete system compromise.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios xe 16.3.7

Vendor Advisories

A vulnerability in the web-based user interface (Web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker to execute commands on the underlying Linux shell of an affected device with root privileges The vulnerability occurs because the affected software improperly sanitizes user-supplied input An attacker who has valid admin ...

Recent Articles

It's 2019 so now security vulnerabilities are branded using emojis: Meet Thrangrycat, a Cisco router secure boot flaw
The Register โ€ข Iain Thomson in San Francisco โ€ข 13 May 2019

That's how you pronounce ๐Ÿ˜พ๐Ÿ˜พ๐Ÿ˜พ: A means to bury spyware deep inside pwned networking gear Sinister secret backdoor found in networking gear perfect for government espionage: The Chinese are โ€“ oh no, wait, it's Cisco again

Security weaknesses at the heart of some of Cisco's network routers, switches, and firewalls can be exploited by hackers to hide spyware deep inside compromised equipment. In order to exploit these flaws, dubbed ๐Ÿ˜พ๐Ÿ˜พ๐Ÿ˜พ or Thrangrycat by their discoverers, a miscreant or rogue employee needs to be able to log into the vulnerable device as an administrator, and can thus already do a lot of damage or snooping on your enterprise anyway. What makes ๐Ÿ˜พ๐Ÿ˜พ๐Ÿ˜พ interesting is that it can be use...