ID

VAR-201905-0593


CVE

CVE-2019-1854


TITLE

Cisco Expressway Series Path traversal vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2019-003899 // CNNVD: CNNVD-201905-048

DESCRIPTION

A vulnerability in the management web interface of Cisco Expressway Series could allow an authenticated, remote attacker to perform a directory traversal attack against an affected device. The vulnerability is due to insufficient input validation on the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to bypass security restrictions and access the web interface of a Cisco Unified Communications Manager associated with the affected device. Valid credentials would still be required to access the Cisco Unified Communications Manager interface. Cisco Expressway Series Contains a path traversal vulnerability.Information may be obtained. An attacker can exploit this issue using directory-traversal characters ('../') to access and write arbitrary files or to execute arbitrary files. This issue is being tracked by Cisco Bug ID CSCvo47769. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths

Trust: 1.98

sources: NVD: CVE-2019-1854 // JVNDB: JVNDB-2019-003899 // BID: 108154 // VULHUB: VHN-150896

AFFECTED PRODUCTS

vendor:ciscomodel:telepresence video communication serverscope:eqversion:x8.11.4

Trust: 1.3

vendor:ciscomodel:telepresence video communication server softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence video communication serverscope:neversion:x12.5.2

Trust: 0.3

sources: BID: 108154 // JVNDB: JVNDB-2019-003899 // NVD: CVE-2019-1854

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1854
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1854
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1854
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201905-048
value: MEDIUM

Trust: 0.6

VULHUB: VHN-150896
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1854
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-150896
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1854
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1854
baseSeverity: MEDIUM
baseScore: 4.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-150896 // JVNDB: JVNDB-2019-003899 // CNNVD: CNNVD-201905-048 // NVD: CVE-2019-1854 // NVD: CVE-2019-1854

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-150896 // JVNDB: JVNDB-2019-003899 // NVD: CVE-2019-1854

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-048

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201905-048

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003899

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-150896

PATCH

title:cisco-sa-20190501-expressway-traversalurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-expressway-traversal

Trust: 0.8

title:Cisco Expressway Series Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92191

Trust: 0.6

sources: JVNDB: JVNDB-2019-003899 // CNNVD: CNNVD-201905-048

EXTERNAL IDS

db:NVDid:CVE-2019-1854

Trust: 2.8

db:BIDid:108154

Trust: 2.0

db:PACKETSTORMid:152963

Trust: 1.7

db:JVNDBid:JVNDB-2019-003899

Trust: 0.8

db:CNNVDid:CNNVD-201905-048

Trust: 0.7

db:AUSCERTid:ESB-2019.1532

Trust: 0.6

db:VULHUBid:VHN-150896

Trust: 0.1

sources: VULHUB: VHN-150896 // BID: 108154 // JVNDB: JVNDB-2019-003899 // CNNVD: CNNVD-201905-048 // NVD: CVE-2019-1854

REFERENCES

url:http://www.securityfocus.com/bid/108154

Trust: 2.3

url:http://packetstormsecurity.com/files/152963/cisco-expressway-gateway-11.5.1-directory-traversal.html

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-expressway-traversal

Trust: 2.0

url:https://seclists.org/bugtraq/2019/may/49

Trust: 1.7

url:http://seclists.org/fulldisclosure/2019/may/28

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-1854

Trust: 1.4

url:http://www.cisco.com

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1854

Trust: 0.8

url:https://www.auscert.org.au/bulletins/80166

Trust: 0.6

sources: VULHUB: VHN-150896 // BID: 108154 // JVNDB: JVNDB-2019-003899 // CNNVD: CNNVD-201905-048 // NVD: CVE-2019-1854

CREDITS

Phillip Huppert of RedTeam Pentesting GmbH .,redteam-pentesting.de,Phillip Huppert of RedTeam Pentesting GmbH.

Trust: 0.6

sources: CNNVD: CNNVD-201905-048

SOURCES

db:VULHUBid:VHN-150896
db:BIDid:108154
db:JVNDBid:JVNDB-2019-003899
db:CNNVDid:CNNVD-201905-048
db:NVDid:CVE-2019-1854

LAST UPDATE DATE

2024-11-23T23:01:50.432000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-150896date:2019-05-20T00:00:00
db:BIDid:108154date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2019-003899date:2019-05-23T00:00:00
db:CNNVDid:CNNVD-201905-048date:2019-05-21T00:00:00
db:NVDid:CVE-2019-1854date:2024-11-21T04:37:32.190

SOURCES RELEASE DATE

db:VULHUBid:VHN-150896date:2019-05-03T00:00:00
db:BIDid:108154date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2019-003899date:2019-05-23T00:00:00
db:CNNVDid:CNNVD-201905-048date:2019-05-01T00:00:00
db:NVDid:CVE-2019-1854date:2019-05-03T17:29:01.297