CVE-2019-1896

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
ciscoCNA
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
ciscounified_computing_system
4.0\(1c\)hs3
ciscointegrated_management_controller_supervisor
2.0.0.0 ≤
𝑥
< 2.0\(13o\)
ciscointegrated_management_controller_supervisor
3.0.0.0 ≤
𝑥
< 3.0\(4k\)
ciscointegrated_management_controller_supervisor
4.0.0.0 ≤
𝑥
< 4.0\(4b\)
ciscointegrated_management_controller_supervisor
4.0.0.0 ≤
𝑥
< 4.0\(2f\)
𝑥
= Vulnerable software versions