CVE-2019-1734
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2019
Last modified:
20/04/2023
Description
A vulnerability in the implementation of a CLI diagnostic command in Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to view sensitive system files that should be restricted. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to incomplete role-based access control (RBAC) verification. An attacker could exploit this vulnerability by authenticating to the device and issuing a specific CLI diagnostic command with crafted user-input parameters. An exploit could allow the attacker to perform an arbitrary read of a file on the device, and the file may contain sensitive information. The attacker needs valid device credentials to exploit this vulnerability.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.2.2.91 (excluding) | |
| cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.3 (including) | 2.3.1.111 (excluding) |
| cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.4 (including) | 2.4.1.101 (excluding) |
| cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* | 6.2\(7\) (excluding) | |
| cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



