CVE编号
CVE-2019-1821利用情况
暂无补丁情况
N/A披露时间
2019-05-16漏洞描述
Cisco Prime Infrastructure(PI)和Cisco Evolved Programmable Network(EPN)Manager的基于web的管理界面中存在一个漏洞,允许经过身份验证的远程攻击者以根级权限在底层操作系统上执行代码。存在此漏洞是因为软件未正确验证用户提供的输入。攻击者可以通过将恶意文件上载到管理web界面来利用此漏洞进行攻击。成功利用此漏洞可使攻击者以根级别权限在底层操作系统上执行代码。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://packetstormsecurity.com/files/153350/Cisco-Prime-Infrastructure-Health... | |
http://www.securityfocus.com/bid/108339 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | evolved_programmable_network_manager | * |
Up to (excluding) 3.0.1 |
|||||
运行在以下环境 | |||||||||
应用 | cisco | network_level_service | 3.0(0.0.83b) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | prime_infrastructure | * |
Up to (excluding) 3.4.1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | file | * |
Up to (excluding) 5.37-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | file | * |
Up to (excluding) 5.37-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | file | * |
Up to (excluding) 5.37-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | file | * |
Up to (excluding) 5.37-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | file | * |
Up to (excluding) 5.32-r2 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | file | * |
Up to (excluding) 5.32-r2 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | file | * |
Up to (excluding) 5.36-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | file | * |
Up to (excluding) 5.37-r1 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | file | * |
Up to (excluding) 5.11-35.amzn2.0.2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | file | * |
Up to (excluding) 5.37-8.48.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | file | * |
Up to (excluding) 1.3.6-4+deb10u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | file | * |
Up to (excluding) 1.3.5-1.1+deb8u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | file | * |
Up to (excluding) 1.3.5b-4+deb9u2 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | file | * |
Up to (excluding) 5.34-15.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | file | * |
Up to (excluding) 5.36-5.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | file | * |
Up to (excluding) 5.37-8.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_6 | file | * |
Up to (excluding) 1.3.3g-11.el6 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | file | * |
Up to (excluding) 1.3.5e-6.el7 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | file | * |
Up to (excluding) 5.32-lp151.8.3.1 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...