ID

VAR-201909-0185


CVE

CVE-2019-12671


TITLE

Cisco IOS XE Vulnerability related to unauthorized authentication in software

Trust: 0.8

sources: JVNDB: JVNDB-2019-009987

DESCRIPTION

A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS. Cisco IOS XE The software is vulnerable to unauthorized authentication.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOS XE is an operating system developed by Cisco for its network equipment. CLI is one of those command line interfaces. An authorization issue vulnerability exists in the CLI in Cisco IOS XE

Trust: 1.71

sources: NVD: CVE-2019-12671 // JVNDB: JVNDB-2019-009987 // VULHUB: VHN-144441

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:16.11.1

Trust: 1.6

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:asr1001-x-rfscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:asr1001-xscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:asr1002-hx-wsscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:asr1001-hx-rfscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:asr1002-hx-rfscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:asr1001-x-wsscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:asr1001-hxscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:asr1002-hxscope:eqversion: -

Trust: 0.6

sources: JVNDB: JVNDB-2019-009987 // CNNVD: CNNVD-201909-1133 // NVD: CVE-2019-12671

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-12671
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-12671
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-12671
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201909-1133
value: HIGH

Trust: 0.6

VULHUB: VHN-144441
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-12671
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-144441
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-12671
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2019-12671
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2019-12671
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-144441 // JVNDB: JVNDB-2019-009987 // CNNVD: CNNVD-201909-1133 // NVD: CVE-2019-12671 // NVD: CVE-2019-12671

PROBLEMTYPE DATA

problemtype:CWE-863

Trust: 1.9

problemtype:CWE-285

Trust: 1.0

sources: VULHUB: VHN-144441 // JVNDB: JVNDB-2019-009987 // NVD: CVE-2019-12671

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201909-1133

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201909-1133

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009987

PATCH

title:cisco-sa-20190925-iosxe-ctbypassurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass

Trust: 0.8

title:Cisco IOS XE CLI Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98551

Trust: 0.6

sources: JVNDB: JVNDB-2019-009987 // CNNVD: CNNVD-201909-1133

EXTERNAL IDS

db:NVDid:CVE-2019-12671

Trust: 2.5

db:JVNDBid:JVNDB-2019-009987

Trust: 0.8

db:CNNVDid:CNNVD-201909-1133

Trust: 0.7

db:AUSCERTid:ESB-2019.3615.2

Trust: 0.6

db:AUSCERTid:ESB-2019.3615

Trust: 0.6

db:VULHUBid:VHN-144441

Trust: 0.1

sources: VULHUB: VHN-144441 // JVNDB: JVNDB-2019-009987 // CNNVD: CNNVD-201909-1133 // NVD: CVE-2019-12671

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-iosxe-ctbypass

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-12671

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-12671

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-webui-cmd-injection

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-vman-cmd-injection

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-utd

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-ctspac-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-xss

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-rawtcp-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-dt

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-sip-alg

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-isdn-data-leak

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-iox-gs

Trust: 0.6

url:httpserv-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-iosxe-fsdos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-ftp

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-iosxe-digsig-bypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-iosxe-codeexec

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-awr

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ios-xe-privilege-escalation-via-consent-token-bypass-30430

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3615.2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3615/

Trust: 0.6

sources: VULHUB: VHN-144441 // JVNDB: JVNDB-2019-009987 // CNNVD: CNNVD-201909-1133 // NVD: CVE-2019-12671

SOURCES

db:VULHUBid:VHN-144441
db:JVNDBid:JVNDB-2019-009987
db:CNNVDid:CNNVD-201909-1133
db:NVDid:CVE-2019-12671

LAST UPDATE DATE

2024-11-23T21:36:54.455000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-144441date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2019-009987date:2019-10-03T00:00:00
db:CNNVDid:CNNVD-201909-1133date:2019-10-17T00:00:00
db:NVDid:CVE-2019-12671date:2024-11-21T04:23:19.470

SOURCES RELEASE DATE

db:VULHUBid:VHN-144441date:2019-09-25T00:00:00
db:JVNDBid:JVNDB-2019-009987date:2019-10-03T00:00:00
db:CNNVDid:CNNVD-201909-1133date:2019-09-25T00:00:00
db:NVDid:CVE-2019-12671date:2019-09-25T21:15:11.750