A vulnerability in the Secure Storage feature of Cisco IOS and IOS XE Software could allow an authenticated, local attacker to access sensitive system information on an affected device. The vulnerability is due to improper memory operations performed at encryption time, when affected software handles configuration updates. An attacker could exploit this vulnerability by retrieving the contents of specific memory locations of an affected device. A successful exploit could result in the disclosure of keying materials that are part of the device configuration, which can be used to recover critical system information.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107594 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-info | Patch Vendor Advisory |
http://www.securityfocus.com/bid/107594 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-info | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107594 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-info - Patch, Vendor Advisory |
Information
Published : 2019-03-28 01:29
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1762
Mitre link : CVE-2019-1762
CVE.ORG link : CVE-2019-1762
JSON object : View
Products Affected
cisco
- ios_xe
- ios
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor