CVE-2019-1896 (GCVE-0-2019-1896)

Vulnerability from cvelistv5 – Published: 2019-08-21 18:20 – Updated: 2024-11-20 17:11
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System E-Series Software (UCSE) Affected: unspecified , < 3.0(4k) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:51.570Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1896",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T16:52:21.918460Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T17:11:47.410Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "3.0(4k)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:20:28",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-imc-cmdinject-1896",
        "defect": [
          [
            "CSCvo36057"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1896",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "3.0(4k)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.2",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-imc-cmdinject-1896",
          "defect": [
            [
              "CSCvo36057"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1896",
    "datePublished": "2019-08-21T18:20:28.706884Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-20T17:11:47.410Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(1c\\\\)hs3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39F8601E-730B-489B-AD2A-FD10FAF28595\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0.0.0\", \"versionEndExcluding\": \"2.0\\\\(13o\\\\)\", \"matchCriteriaId\": \"416F7C96-3EF0-4B6D-B414-3FC0D0848144\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0.0.0\", \"versionEndExcluding\": \"3.0\\\\(4k\\\\)\", \"matchCriteriaId\": \"0056011A-04F0-4185-8EE7-B1B30CAAA863\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.0.0.0\", \"versionEndExcluding\": \"4.0\\\\(4b\\\\)\", \"matchCriteriaId\": \"59EE9E78-D09E-4069-BC84-ED42E3EE76F1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"678F3A32-372A-441E-8115-95181FBAF628\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01AE8153-6C23-46AB-BEAA-A6F27FDFEED7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF77273F-73C0-40EB-BB4E-75269D46F074\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"757958F5-F58C-4128-B128-D989A56ACA34\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F62D6B73-1AB7-4B93-A92E-275E78DF114C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0E6AAD9-824C-4126-8347-2FF1895E6D33\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e168d-m2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BD31E5A-518C-482F-A926-383ADCC7015E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"155D990F-C7DA-48DD-92CC-18542DBBE572\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADD4A429-F168-460B-A964-8F1BD94C6387\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD25964B-08B7-477E-A507-5FE5EE7CD286\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FDC8A69-0914-44C1-8AEA-262E0A285C81\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.0.0.0\", \"versionEndExcluding\": \"4.0\\\\(2f\\\\)\", \"matchCriteriaId\": \"F5549F4C-CF65-4F22-9675-EFAA99964CA0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"678F3A32-372A-441E-8115-95181FBAF628\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01AE8153-6C23-46AB-BEAA-A6F27FDFEED7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF77273F-73C0-40EB-BB4E-75269D46F074\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"757958F5-F58C-4128-B128-D989A56ACA34\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F62D6B73-1AB7-4B93-A92E-275E78DF114C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0E6AAD9-824C-4126-8347-2FF1895E6D33\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e168d-m2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BD31E5A-518C-482F-A926-383ADCC7015E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"155D990F-C7DA-48DD-92CC-18542DBBE572\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADD4A429-F168-460B-A964-8F1BD94C6387\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD25964B-08B7-477E-A507-5FE5EE7CD286\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FDC8A69-0914-44C1-8AEA-262E0A285C81\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la interfaz de administraci\\u00f3n basada en la web de Cisco Integrated Management Controller (IMC) podr\\u00eda permitir que un atacante remoto autenticado inyecte comandos arbitrarios y obtenga privilegios de root. La vulnerabilidad se debe a una validaci\\u00f3n insuficiente de la entrada proporcionada por el usuario en la funci\\u00f3n de Solicitud de firma de certificado (CSR) de la interfaz de administraci\\u00f3n basada en la web. Un atacante podr\\u00eda aprovechar esta vulnerabilidad al enviar una CSR dise\\u00f1ada en la interfaz de administraci\\u00f3n basada en la web. Una explotaci\\u00f3n exitosa podr\\u00eda permitir que un atacante con privilegios de administrador ejecute comandos arbitrarios en el dispositivo con todos los privilegios de root.\"}]",
      "id": "CVE-2019-1896",
      "lastModified": "2024-11-21T04:37:38.333",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-08-21T19:15:15.013",
      "references": "[{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-1896\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2019-08-21T19:15:15.013\",\"lastModified\":\"2024-11-21T04:37:38.333\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de Cisco Integrated Management Controller (IMC) podr\u00eda permitir que un atacante remoto autenticado inyecte comandos arbitrarios y obtenga privilegios de root. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario en la funci\u00f3n de Solicitud de firma de certificado (CSR) de la interfaz de administraci\u00f3n basada en la web. Un atacante podr\u00eda aprovechar esta vulnerabilidad al enviar una CSR dise\u00f1ada en la interfaz de administraci\u00f3n basada en la web. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante con privilegios de administrador ejecute comandos arbitrarios en el dispositivo con todos los privilegios de root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(1c\\\\)hs3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F8601E-730B-489B-AD2A-FD10FAF28595\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0.0\",\"versionEndExcluding\":\"2.0\\\\(13o\\\\)\",\"matchCriteriaId\":\"416F7C96-3EF0-4B6D-B414-3FC0D0848144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0.0\",\"versionEndExcluding\":\"3.0\\\\(4k\\\\)\",\"matchCriteriaId\":\"0056011A-04F0-4185-8EE7-B1B30CAAA863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0.0\",\"versionEndExcluding\":\"4.0\\\\(4b\\\\)\",\"matchCriteriaId\":\"59EE9E78-D09E-4069-BC84-ED42E3EE76F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678F3A32-372A-441E-8115-95181FBAF628\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01AE8153-6C23-46AB-BEAA-A6F27FDFEED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF77273F-73C0-40EB-BB4E-75269D46F074\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757958F5-F58C-4128-B128-D989A56ACA34\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F62D6B73-1AB7-4B93-A92E-275E78DF114C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E6AAD9-824C-4126-8347-2FF1895E6D33\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e168d-m2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD31E5A-518C-482F-A926-383ADCC7015E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155D990F-C7DA-48DD-92CC-18542DBBE572\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADD4A429-F168-460B-A964-8F1BD94C6387\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD25964B-08B7-477E-A507-5FE5EE7CD286\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FDC8A69-0914-44C1-8AEA-262E0A285C81\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0.0\",\"versionEndExcluding\":\"4.0\\\\(2f\\\\)\",\"matchCriteriaId\":\"F5549F4C-CF65-4F22-9675-EFAA99964CA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678F3A32-372A-441E-8115-95181FBAF628\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01AE8153-6C23-46AB-BEAA-A6F27FDFEED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF77273F-73C0-40EB-BB4E-75269D46F074\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757958F5-F58C-4128-B128-D989A56ACA34\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F62D6B73-1AB7-4B93-A92E-275E78DF114C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E6AAD9-824C-4126-8347-2FF1895E6D33\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e168d-m2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD31E5A-518C-482F-A926-383ADCC7015E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155D990F-C7DA-48DD-92CC-18542DBBE572\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADD4A429-F168-460B-A964-8F1BD94C6387\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD25964B-08B7-477E-A507-5FE5EE7CD286\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FDC8A69-0914-44C1-8AEA-262E0A285C81\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"affected\": [{\"product\": \"Cisco Unified Computing System E-Series Software (UCSE)\", \"vendor\": \"Cisco\", \"versions\": [{\"lessThan\": \"3.0(4k)\", \"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2019-08-21T00:00:00\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"metrics\": [{\"cvssV3_0\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.0\"}}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-78\", \"description\": \"CWE-78\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2019-08-21T18:20:28\", \"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\"}, \"references\": [{\"name\": \"20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"], \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896\"}], \"source\": {\"advisory\": \"cisco-sa-20190821-imc-cmdinject-1896\", \"defect\": [[\"CSCvo36057\"]], \"discovery\": \"INTERNAL\"}, \"title\": \"Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability\", \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2019-08-21T16:00:00-0700\", \"ID\": \"CVE-2019-1896\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"Cisco Unified Computing System E-Series Software (UCSE)\", \"version\": {\"version_data\": [{\"affected\": \"\u003c\", \"version_affected\": \"\u003c\", \"version_value\": \"3.0(4k)\"}]}}]}, \"vendor_name\": \"Cisco\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.\"}]}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"impact\": {\"cvss\": {\"baseScore\": \"7.2\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.0\"}}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-78\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability\", \"refsource\": \"CISCO\", \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896\"}]}, \"source\": {\"advisory\": \"cisco-sa-20190821-imc-cmdinject-1896\", \"defect\": [[\"CSCvo36057\"]], \"discovery\": \"INTERNAL\"}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T18:35:51.570Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"name\": \"20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"], \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-1896\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-20T16:52:21.918460Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-20T16:54:06.788Z\"}}]}",
      "cveMetadata": "{\"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"assignerShortName\": \"cisco\", \"cveId\": \"CVE-2019-1896\", \"datePublished\": \"2019-08-21T18:20:28.706884Z\", \"dateReserved\": \"2018-12-06T00:00:00\", \"dateUpdated\": \"2024-11-20T17:11:47.410Z\", \"state\": \"PUBLISHED\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…