var-201902-0449
Vulnerability from variot

A vulnerability in the TFTP service of Cisco Network Convergence System 1000 Series software could allow an unauthenticated, remote attacker to retrieve arbitrary files from the targeted device, possibly resulting in information disclosure. The vulnerability is due to improper validation of user-supplied input within TFTP requests processed by the affected software. An attacker could exploit this vulnerability by using directory traversal techniques in malicious requests sent to the TFTP service on a targeted device. An exploit could allow the attacker to retrieve arbitrary files from the targeted device, resulting in the disclosure of sensitive information. This vulnerability affects Cisco IOS XR Software releases prior to Release 6.5.2 for Cisco Network Convergence System 1000 Series devices when the TFTP service is enabled. Cisco IOS XR The software contains a path traversal vulnerability.Information may be obtained. This issue is tracked by Cisco Bug ID CSCvk32415

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0449",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ios xr",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "cisco",
        "version": "6.5.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3.5"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.7.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "network convergence system series 6.5.2.9i.base",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.8.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.6.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.8.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2.4"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.1"
      },
      {
        "model": "network convergence system series 6.5.2.10i.base",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.6.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.9"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.0"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.9.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.4"
      },
      {
        "model": "network convergence system series 7.0.1.19i.base",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.1.0"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.7.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2.50"
      },
      {
        "model": "network convergence system series 6.6.11.12i.base",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.0"
      },
      {
        "model": "network convergence system series 6.5.1.base",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.6"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.7.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.4.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.4.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.8.4"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.4"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.6.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3.4"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.8.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.7"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.3"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.3.5"
      },
      {
        "model": "network convergence system series 6.6.1.19i.base",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "1000"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.5.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2.6"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.3.4"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.9.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.8"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.3.1"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.2.2"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.11"
      },
      {
        "model": "ios xr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.4"
      },
      {
        "model": "ios xr",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6.5.2"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "107107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "6.5.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "This vulnerability was found during internal security testing.,Cisco,vendor ?? ??",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-1681",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2019-1681",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-148993",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ykramarz@cisco.com",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-1681",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2019-1681",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "ykramarz@cisco.com",
            "id": "CVE-2019-1681",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201902-799",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-148993",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-1681",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-1681"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability in the TFTP service of Cisco Network Convergence System 1000 Series software could allow an unauthenticated, remote attacker to retrieve arbitrary files from the targeted device, possibly resulting in information disclosure. The vulnerability is due to improper validation of user-supplied input within TFTP requests processed by the affected software. An attacker could exploit this vulnerability by using directory traversal techniques in malicious requests sent to the TFTP service on a targeted device. An exploit could allow the attacker to retrieve arbitrary files from the targeted device, resulting in the disclosure of sensitive information. This vulnerability affects Cisco IOS XR Software releases prior to Release 6.5.2 for Cisco Network Convergence System 1000 Series devices when the TFTP service is enabled. Cisco IOS XR The software contains a path traversal vulnerability.Information may be obtained. \nThis issue is tracked by Cisco Bug ID CSCvk32415",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "BID",
        "id": "107107"
      },
      {
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-1681"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-1681",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "107107",
        "trust": 2.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.0535",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "42790",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-148993",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-1681",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-1681"
      },
      {
        "db": "BID",
        "id": "107107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ]
  },
  "id": "VAR-201902-0449",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-148993"
      }
    ],
    "trust": 0.7875
  },
  "last_update_date": "2023-12-18T13:52:24.932000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20190220-ncs",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190220-ncs"
      },
      {
        "title": "Cisco Network Convergence System 1000 Series IOS XR Software Repair measures for information disclosure vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=89593"
      },
      {
        "title": "Cisco: Cisco Network Convergence System 1000 Series TFTP Directory Traversal Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20190220-ncs"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-1681"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190220-ncs"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/107107"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1681"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1681"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/42790"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/75886"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/22.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-1681"
      },
      {
        "db": "BID",
        "id": "107107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-1681"
      },
      {
        "db": "BID",
        "id": "107107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-02-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "date": "2019-02-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-1681"
      },
      {
        "date": "2019-02-20T00:00:00",
        "db": "BID",
        "id": "107107"
      },
      {
        "date": "2019-03-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "date": "2019-02-21T20:29:00.290000",
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "date": "2019-02-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-148993"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-1681"
      },
      {
        "date": "2019-02-20T00:00:00",
        "db": "BID",
        "id": "107107"
      },
      {
        "date": "2019-03-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      },
      {
        "date": "2023-03-24T17:47:28.190000",
        "db": "NVD",
        "id": "CVE-2019-1681"
      },
      {
        "date": "2019-02-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco IOS XR Software path traversal vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001932"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-799"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.