ID

VAR-201908-0849


CVE

CVE-2019-1972


TITLE

Cisco Enterprise NFV Infrastructure Software Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2019-007621

DESCRIPTION

A vulnerability the Cisco Enterprise NFV Infrastructure Software (NFVIS) restricted CLI could allow an authenticated, local attacker with valid administrator-level credentials to elevate privileges and execute arbitrary commands on the underlying operating system as root. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by leveraging the insufficient restrictions during the execution of an affected command. A successful exploit could allow the attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. Cisco Enterprise NFV Infrastructure Software (NFVIS) Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Enterprise NFV Infrastructure Software (NFVIS) is a set of NVF infrastructure software platform of Cisco (Cisco). The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller

Trust: 1.8

sources: NVD: CVE-2019-1972 // JVNDB: JVNDB-2019-007621 // VULHUB: VHN-152194 // VULMON: CVE-2019-1972

AFFECTED PRODUCTS

vendor:ciscomodel:enterprise network function virtualization infrastructurescope:lteversion:3.10.3

Trust: 1.0

vendor:ciscomodel:enterprise network function virtualization infrastructurescope:gteversion:3.6.3

Trust: 1.0

vendor:ciscomodel:enterprise nfv infrastructure softwarescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-007621 // NVD: CVE-2019-1972

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1972
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1972
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1972
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201908-559
value: MEDIUM

Trust: 0.6

VULHUB: VHN-152194
value: HIGH

Trust: 0.1

VULMON: CVE-2019-1972
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1972
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-152194
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1972
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1972
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-152194 // VULMON: CVE-2019-1972 // JVNDB: JVNDB-2019-007621 // CNNVD: CNNVD-201908-559 // NVD: CVE-2019-1972 // NVD: CVE-2019-1972

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

problemtype:NVD-CWE-Other

Trust: 1.0

sources: VULHUB: VHN-152194 // JVNDB: JVNDB-2019-007621 // NVD: CVE-2019-1972

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201908-559

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201908-559

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-007621

PATCH

title:cisco-sa-20190807-nfv-privescalurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-privescal

Trust: 0.8

title:Cisco Enterprise NFV Infrastructure Software Fixes for permissions and access control issues vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96256

Trust: 0.6

title:Cisco: Cisco Enterprise NFV Infrastructure Software Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20190807-nfv-privescal

Trust: 0.1

sources: VULMON: CVE-2019-1972 // JVNDB: JVNDB-2019-007621 // CNNVD: CNNVD-201908-559

EXTERNAL IDS

db:NVDid:CVE-2019-1972

Trust: 2.6

db:JVNDBid:JVNDB-2019-007621

Trust: 0.8

db:CNNVDid:CNNVD-201908-559

Trust: 0.7

db:AUSCERTid:ESB-2019.2983

Trust: 0.6

db:VULHUBid:VHN-152194

Trust: 0.1

db:VULMONid:CVE-2019-1972

Trust: 0.1

sources: VULHUB: VHN-152194 // VULMON: CVE-2019-1972 // JVNDB: JVNDB-2019-007621 // CNNVD: CNNVD-201908-559 // NVD: CVE-2019-1972

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfv-privescal

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-1972

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1972

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfv-commandinj

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfv-read

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfvis-authbypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfvis-vnc-authbypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfv-cli-path

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfv-pwrecov

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfv-fileread

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190807-nfv-xss

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2983/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-152194 // VULMON: CVE-2019-1972 // JVNDB: JVNDB-2019-007621 // CNNVD: CNNVD-201908-559 // NVD: CVE-2019-1972

SOURCES

db:VULHUBid:VHN-152194
db:VULMONid:CVE-2019-1972
db:JVNDBid:JVNDB-2019-007621
db:CNNVDid:CNNVD-201908-559
db:NVDid:CVE-2019-1972

LAST UPDATE DATE

2024-11-23T21:06:40.822000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-152194date:2020-10-16T00:00:00
db:VULMONid:CVE-2019-1972date:2020-10-16T00:00:00
db:JVNDBid:JVNDB-2019-007621date:2019-08-16T00:00:00
db:CNNVDid:CNNVD-201908-559date:2020-10-21T00:00:00
db:NVDid:CVE-2019-1972date:2024-11-21T04:37:48.090

SOURCES RELEASE DATE

db:VULHUBid:VHN-152194date:2019-08-08T00:00:00
db:VULMONid:CVE-2019-1972date:2019-08-08T00:00:00
db:JVNDBid:JVNDB-2019-007621date:2019-08-16T00:00:00
db:CNNVDid:CNNVD-201908-559date:2019-08-07T00:00:00
db:NVDid:CVE-2019-1972date:2019-08-08T08:15:13.070