A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-ios-gos-auth | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-09-25 20:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-12648
Mitre link : CVE-2019-12648
CVE.ORG link : CVE-2019-12648
JSON object : View
Products Affected
cisco
- cgr1240
- ios
- cgr_1120
- 829_industrial_integrated_services_routers
- 807_industrial_integrated_services_routers
- 809_industrial_integrated_services_routers