ID

VAR-201911-1304


CVE

CVE-2019-15958


TITLE

Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-012704

DESCRIPTION

A vulnerability in the REST API of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated remote attacker to execute arbitrary code with root privileges on the underlying operating system. The vulnerability is due to insufficient input validation during the initial High Availability (HA) configuration and registration process of an affected device. An attacker could exploit this vulnerability by uploading a malicious file during the HA registration period. A successful exploit could allow the attacker to execute arbitrary code with root-level privileges on the underlying operating system. Note: This vulnerability can only be exploited during the HA registration period. See the Details section for more information. Cisco Prime Infrastructure Software is a foundational network lifecycle management solution. The product integrates Cisco Prime LAN Management Solution (LMS) and Cisco Prime Network Control System (NCS). The following products and versions are affected: Cisco PI Software prior to 3.4.2, prior to 3.5.1, prior to 3.6.0 Update 02; Cisco EPNM prior to 3.0.2

Trust: 1.71

sources: NVD: CVE-2019-15958 // JVNDB: JVNDB-2019-012704 // VULHUB: VHN-148056

AFFECTED PRODUCTS

vendor:ciscomodel:prime infrastructurescope:gteversion:3.5

Trust: 1.0

vendor:ciscomodel:prime infrastructurescope:eqversion:3.6

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:ltversion:3.0.2

Trust: 1.0

vendor:ciscomodel:prime infrastructurescope:ltversion:3.5.1

Trust: 1.0

vendor:ciscomodel:prime infrastructurescope:ltversion:3.4.2

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope: - version: -

Trust: 0.8

vendor:ciscomodel:prime infrastructurescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-012704 // NVD: CVE-2019-15958

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-15958
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2019-15958
value: HIGH

Trust: 1.0

NVD: CVE-2019-15958
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201911-363
value: CRITICAL

Trust: 0.6

VULHUB: VHN-148056
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-15958
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148056
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-15958
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2019-15958
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2019-15958
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-148056 // JVNDB: JVNDB-2019-012704 // CNNVD: CNNVD-201911-363 // NVD: CVE-2019-15958 // NVD: CVE-2019-15958

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-148056 // JVNDB: JVNDB-2019-012704 // NVD: CVE-2019-15958

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201911-363

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201911-363

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-012704

PATCH

title:cisco-sa-20191106-pi-epn-codexurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex

Trust: 0.8

title:Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=102508

Trust: 0.6

sources: JVNDB: JVNDB-2019-012704 // CNNVD: CNNVD-201911-363

EXTERNAL IDS

db:NVDid:CVE-2019-15958

Trust: 2.5

db:JVNDBid:JVNDB-2019-012704

Trust: 0.8

db:CNNVDid:CNNVD-201911-363

Trust: 0.7

db:AUSCERTid:ESB-2019.4189

Trust: 0.6

db:AUSCERTid:ESB-2019.4299

Trust: 0.6

db:VULHUBid:VHN-148056

Trust: 0.1

sources: VULHUB: VHN-148056 // JVNDB: JVNDB-2019-012704 // CNNVD: CNNVD-201911-363 // NVD: CVE-2019-15958

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191106-pi-epn-codex

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-15958

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15958

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.4189/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4299/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-prime-infrastructure-code-execution-via-rest-api-ha-registration-period-30803

Trust: 0.6

sources: VULHUB: VHN-148056 // JVNDB: JVNDB-2019-012704 // CNNVD: CNNVD-201911-363 // NVD: CVE-2019-15958

CREDITS

Steven Seeley (mr_me) of Source Incite .

Trust: 0.6

sources: CNNVD: CNNVD-201911-363

SOURCES

db:VULHUBid:VHN-148056
db:JVNDBid:JVNDB-2019-012704
db:CNNVDid:CNNVD-201911-363
db:NVDid:CVE-2019-15958

LAST UPDATE DATE

2024-11-23T22:51:33.350000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148056date:2020-10-22T00:00:00
db:JVNDBid:JVNDB-2019-012704date:2019-12-11T00:00:00
db:CNNVDid:CNNVD-201911-363date:2020-10-23T00:00:00
db:NVDid:CVE-2019-15958date:2024-11-21T04:29:49.350

SOURCES RELEASE DATE

db:VULHUBid:VHN-148056date:2019-11-26T00:00:00
db:JVNDBid:JVNDB-2019-012704date:2019-12-11T00:00:00
db:CNNVDid:CNNVD-201911-363date:2019-11-06T00:00:00
db:NVDid:CVE-2019-15958date:2019-11-26T03:15:11.503