Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

mercredi 19 juin 2019

Cisco SD-WAN Solution vManage Web-based UI HTTP Requests privilege escalation

A vulnerability was found in Cisco SD-WAN Solution (affected version not known) and classified as critical. Affected by this issue is an unknown function of the component vManage Web-based UI. The manipulation as part of a HTTP Requests leads to a privilege escalation vulnerability. Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was shared 06/20/2019 as cisco-sa-20190619-sdwan-privil as confirmed advisory (Website). The advisory is shared for download at This vulnerability is handled as CVE-2019-1626 since 12/06/2018. The attack may be launched remotely. A single authentication is needed for exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 06/20/2019).

Upgrading eliminates this vulnerability.

The entries 136723 and 136722 are related to this item.




CPE 2.3

CPE 2.2


VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0

VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍


Class: Privilege escalation (CWE-269)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligence

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍


Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒


12/06/2018 CVE assigned
06/20/2019 Advisory disclosed
06/20/2019 VulDB entry created
06/20/2019 VulDB last update



Advisory: cisco-sa-20190619-sdwan-privil
Status: Confirmed

CVE: CVE-2019-1626 (🔒)
See also: 🔒


Created: 06/20/2019 10:24 AM
Complete: 🔍

Lien vers l'article source

Auteur: VulDB

Catégories: VulDBNombre de vues: 176


Événements SSI