CVE-2019-1966
Summary
| CVE | CVE-2019-1966 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-08-30 09:15:00 UTC |
| Updated | 2020-10-16 14:05:00 UTC |
| Description | A vulnerability in a specific CLI command within the local management (local-mgmt) context for Cisco UCS Fabric Interconnect Software could allow an authenticated, local attacker to gain elevated privileges as the root user on an affected device. The vulnerability is due to extraneous subcommand options present for a specific CLI command within the local-mgmt context. An attacker could exploit this vulnerability by authenticating to an affected device, entering the local-mgmt context, and issuing a specific CLI command and submitting user input. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid user credentials for the device. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Cisco | Nx-os | 4.0 | All | All | All |
| Operating System | Cisco | Nx-os | 4.0 | All | All | All |
| Operating System | Cisco | Nx-os | All | All | All | All |
| Hardware | Cisco | Ucs 6248 Up Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6248 Up Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6296 Up Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6296 Up Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6324 Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6324 Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6332-16up Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6332-16up Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6332 Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6332 Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6454 Fabric Interconnect | - | All | All | All |
| Hardware | Cisco | Ucs 6454 Fabric Interconnect | - | All | All | All |
| Application | Cisco | Unified Computing System | 3.2(3b)a | All | All | All |
| Application | Cisco | Unified Computing System | 3.2\(3b\)a | All | All | All |
| Application | Cisco | Unified Computing System | 4.0(1a)a | All | All | All |
| Application | Cisco | Unified Computing System | 4.0\(1a\)a | All | All | All |
| Application | Cisco | Unified Computing System | 3.2\(3b\)a | All | All | All |
| Application | Cisco | Unified Computing System | 4.0\(1a\)a | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Unified Computing System Fabric Interconnect root Privilege Escalation Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.