First published: Thu Feb 21 2019(Updated: )
A vulnerability in the web-based user interface of Cisco Internet of Things Field Network Director (IoT-FND) Software could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by importing a crafted XML file with malicious entries, which could allow the attacker to read files within the affected application. Versions prior to 4.4(0.26) are affected.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.4\(0.26\) | |
<4.4\(0.26\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1698 has been assigned a medium severity rating due to its potential to expose sensitive information.
To fix CVE-2019-1698, users should upgrade Cisco IoT Field Network Director to a version higher than 4.4(0.26).
CVE-2019-1698 affects users of Cisco IoT Field Network Director versions up to and including 4.4(0.26).
The implications of CVE-2019-1698 include the potential for attackers to read sensitive information stored on the affected system.
Yes, CVE-2019-1698 requires that an attacker be authenticated to gain access to the vulnerable system.