ID

VAR-201901-0348


CVE

CVE-2019-1650


TITLE

Cisco SD-WAN Solution Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-001425

DESCRIPTION

A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the save command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the save command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. Cisco SD-WAN Solution Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco SD-WAN is prone to an arbitrary file-overwrite vulnerability. Attackers can overwrite arbitrary files on an unsuspecting user's computer in the context of the vulnerable application. This issue is being tracked by Cisco Bug IDs CSCvi69862. Cisco SD-WAN Solution versions prior to 18.4.0 are vulnerable. Cisco vBond Orchestrator Software and others are products of Cisco (Cisco). Cisco vBond Orchestrator Software is a suite of secure network extension management software. vEdge 100 Series Routers is a 100 series router product. SD-WAN Solution is a set of network expansion solutions running in it. The following products are affected: Cisco vBond Orchestrator Software; vEdge 100 Series Routers; vEdge 1000 Series Routers; vEdge 2000 Series Routers; vEdge 5000 Series Routers; vEdge Cloud Router Platform; vManage Network Management Software; vSmart Controller Software

Trust: 1.98

sources: NVD: CVE-2019-1650 // JVNDB: JVNDB-2019-001425 // BID: 106716 // VULHUB: VHN-148652

AFFECTED PRODUCTS

vendor:ciscomodel:vmanage network managementscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wanscope:ltversion:18.4.0

Trust: 1.0

vendor:ciscomodel:vedge 5000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vsmart controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:vedge 100scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vedge 1000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vbond orchestratorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:vedge 2000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:sd-wanscope: - version: -

Trust: 0.8

vendor:ciscomodel:vbond orchestratorscope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 100scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 1000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 2000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vedge 5000scope: - version: -

Trust: 0.8

vendor:ciscomodel:vmanage network managementscope: - version: -

Trust: 0.8

vendor:ciscomodel:vsmart controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:vsmart controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vmanage network managementscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vedge cloud routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:20000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:10000

Trust: 0.3

vendor:ciscomodel:vedgescope:eqversion:1000

Trust: 0.3

vendor:ciscomodel:vbond orchestratorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:sd-wanscope:eqversion:18.3.1

Trust: 0.3

vendor:ciscomodel:sd-wanscope:eqversion:18.3

Trust: 0.3

vendor:ciscomodel:sd-wanscope:eqversion:17.2.8

Trust: 0.3

vendor:ciscomodel:sd-wanscope:neversion:18.4

Trust: 0.3

sources: BID: 106716 // JVNDB: JVNDB-2019-001425 // NVD: CVE-2019-1650

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1650
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1650
value: HIGH

Trust: 1.0

NVD: CVE-2019-1650
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201901-869
value: HIGH

Trust: 0.6

VULHUB: VHN-148652
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1650
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148652
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1650
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1650
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-148652 // JVNDB: JVNDB-2019-001425 // CNNVD: CNNVD-201901-869 // NVD: CVE-2019-1650 // NVD: CVE-2019-1650

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-78

Trust: 1.1

sources: VULHUB: VHN-148652 // JVNDB: JVNDB-2019-001425 // NVD: CVE-2019-1650

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-869

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201901-869

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001425

PATCH

title:cisco-sa-20190123-sdwan-file-writeurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-file-write

Trust: 0.8

title:Cisco SD-WAN Solution Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88955

Trust: 0.6

sources: JVNDB: JVNDB-2019-001425 // CNNVD: CNNVD-201901-869

EXTERNAL IDS

db:NVDid:CVE-2019-1650

Trust: 2.8

db:BIDid:106716

Trust: 2.0

db:JVNDBid:JVNDB-2019-001425

Trust: 0.8

db:CNNVDid:CNNVD-201901-869

Trust: 0.7

db:NSFOCUSid:43890

Trust: 0.6

db:VULHUBid:VHN-148652

Trust: 0.1

sources: VULHUB: VHN-148652 // BID: 106716 // JVNDB: JVNDB-2019-001425 // CNNVD: CNNVD-201901-869 // NVD: CVE-2019-1650

REFERENCES

url:http://www.securityfocus.com/bid/106716

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190123-sdwan-file-write

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1650

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-1650

Trust: 0.8

url:http://www.nsfocus.net/vulndb/43890

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-148652 // BID: 106716 // JVNDB: JVNDB-2019-001425 // CNNVD: CNNVD-201901-869 // NVD: CVE-2019-1650

CREDITS

This vulnerability was found during internal security testing.,Cisco

Trust: 0.6

sources: CNNVD: CNNVD-201901-869

SOURCES

db:VULHUBid:VHN-148652
db:BIDid:106716
db:JVNDBid:JVNDB-2019-001425
db:CNNVDid:CNNVD-201901-869
db:NVDid:CVE-2019-1650

LAST UPDATE DATE

2024-08-14T14:26:30.010000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148652date:2020-10-05T00:00:00
db:BIDid:106716date:2019-01-23T00:00:00
db:JVNDBid:JVNDB-2019-001425date:2019-03-05T00:00:00
db:CNNVDid:CNNVD-201901-869date:2020-10-22T00:00:00
db:NVDid:CVE-2019-1650date:2020-10-05T19:28:27.607

SOURCES RELEASE DATE

db:VULHUBid:VHN-148652date:2019-01-24T00:00:00
db:BIDid:106716date:2019-01-23T00:00:00
db:JVNDBid:JVNDB-2019-001425date:2019-03-05T00:00:00
db:CNNVDid:CNNVD-201901-869date:2019-01-24T00:00:00
db:NVDid:CVE-2019-1650date:2019-01-24T15:29:00.830