CVE-2019-1647
moderate-risk
Published 2019-01-24
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, adjacent attacker to bypass authentication and have direct unauthorized access to other vSmart containers. The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the attacker to retrieve and modify critical system files.
Do I need to act?
-
0.85% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.0/10
High
ADJACENT_NETWORK
/ LOW complexity
Affected Products (2)
Vsmart Controller
Affected Vendors
References (4)
Third Party Advisory
http://www.securityfocus.com/bid/106705
Third Party Advisory
http://www.securityfocus.com/bid/106705
35
/ 100
moderate-risk
Severity
25/34 · High
Exploitability
3/34 · Minimal
Exposure
7/34 · Low