First published: Tue Feb 12 2019(Updated: )
A vulnerability in the management web interface of Cisco Network Assurance Engine (NAE) could allow an unauthenticated, local attacker to gain unauthorized access or cause a Denial of Service (DoS) condition on the server. The vulnerability is due to a fault in the password management system of NAE. An attacker could exploit this vulnerability by authenticating with the default administrator password via the CLI of an affected server. A successful exploit could allow the attacker to view potentially sensitive information or bring the server down, causing a DoS condition. This vulnerability affects Cisco Network Assurance Engine (NAE) Release 3.0(1). The default password condition only affects new installations of Release 3.0(1).
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Network Assurance Engine | =3.0\(1\) | |
=3.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1688 is a vulnerability in the management web interface of Cisco Network Assurance Engine (NAE) that could allow unauthorized access or cause a Denial of Service (DoS) condition.
An unauthenticated, local attacker can exploit CVE-2019-1688 by exploiting a fault in the password management system of Cisco NAE.
CVE-2019-1688 has a severity rating of 7.1, which is considered high.
Cisco Network Assurance Engine (NAE) version 3.0(1) is affected by CVE-2019-1688.
To fix the vulnerability described in CVE-2019-1688, Cisco recommends upgrading to a fixed software release.