First published: Thu Mar 28 2019(Updated: )
A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =2.3 | |
Cisco IOS | =12.2\(6\)i1 | |
Cisco IOS | =12.4\(25e\)jap1m | |
Cisco IOS | =12.4\(25e\)jap2 | |
Cisco IOS | =12.4\(25e\)jap26 | |
Cisco IOS | =12.4\(25e\)jaz1 | |
Cisco IOS | =15.1\(2\)sg8a | |
Cisco IOS | =15.1\(3\)svg3d | |
Cisco IOS | =15.1\(3\)svi1b | |
Cisco IOS | =15.1\(3\)svm3 | |
Cisco IOS | =15.1\(3\)svn2 | |
Cisco IOS | =15.1\(3\)svo1 | |
Cisco IOS | =15.1\(3\)svo2 | |
Cisco IOS | =15.1\(3\)svp1 | |
Cisco IOS | =15.1\(4\)m12c | |
Cisco IOS | =15.2\(2\)e4 | |
Cisco IOS | =15.2\(2\)e5 | |
Cisco IOS | =15.2\(2\)e5a | |
Cisco IOS | =15.2\(2\)e5b | |
Cisco IOS | =15.2\(2\)e6 | |
Cisco IOS | =15.2\(2\)e7 | |
Cisco IOS | =15.2\(2\)e7b | |
Cisco IOS | =15.2\(2\)e8 | |
Cisco IOS | =15.2\(3\)e4 | |
Cisco IOS | =15.2\(3\)e5 | |
Cisco IOS | =15.2\(3\)ea1 | |
Cisco IOS | =15.2\(4\)e2 | |
Cisco IOS | =15.2\(4\)e3 | |
Cisco IOS | =15.2\(4\)e4 | |
Cisco IOS | =15.2\(4\)e5 | |
Cisco IOS | =15.2\(4\)e5a | |
Cisco IOS | =15.2\(4\)e6 | |
Cisco IOS | =15.2\(4\)ea8 | |
Cisco IOS | =15.2\(4\)ea9 | |
Cisco IOS | =15.2\(4\)jaz1 | |
Cisco IOS | =15.2\(4\)jn1 | |
Cisco IOS | =15.2\(4a\)ea5 | |
Cisco IOS | =15.2\(4m\)e2 | |
Cisco IOS | =15.2\(4m\)e3 | |
Cisco IOS | =15.2\(4n\)e2 | |
Cisco IOS | =15.2\(4o\)e2 | |
Cisco IOS | =15.2\(4o\)e3 | |
Cisco IOS | =15.2\(4p\)e1 | |
Cisco IOS | =15.2\(4q\)e1 | |
Cisco IOS | =15.2\(4s\)e1 | |
Cisco IOS | =15.2\(4s\)e2 | |
Cisco IOS | =15.2\(5\)e | |
Cisco IOS | =15.2\(5\)e1 | |
Cisco IOS | =15.2\(5\)e2 | |
Cisco IOS | =15.2\(5\)e2b | |
Cisco IOS | =15.2\(5\)e2c | |
Cisco IOS | =15.2\(5\)ea | |
Cisco IOS | =15.2\(5\)ex | |
Cisco IOS | =15.2\(5a\)e | |
Cisco IOS | =15.2\(5a\)e1 | |
Cisco IOS | =15.2\(5b\)e | |
Cisco IOS | =15.2\(5c\)e | |
Cisco IOS | =15.2\(6\)e | |
Cisco IOS | =15.2\(6\)e0a | |
Cisco IOS | =15.2\(6\)e0c | |
Cisco IOS | =15.2\(6\)e1 | |
Cisco IOS | =15.2\(6\)e1a | |
Cisco IOS | =15.2\(6\)e1s | |
Cisco IOS | =15.3\(3\)ja1n | |
Cisco IOS | =15.3\(3\)jd15 | |
Cisco IOS | =15.3\(3\)jda15 | |
Cisco IOS | =15.3\(3\)jf35 | |
Cisco IOS | =15.3\(3\)ji | |
Cisco IOS | =15.3\(3\)ji2 | |
Cisco IOS | =15.3\(3\)jn1 | |
Cisco IOS | =15.3\(3\)jn2 | |
Cisco IOS | =15.5\(3\)s1 | |
Cisco IOS | =15.5\(3\)s1a | |
Cisco IOS | =15.5\(3\)s2 | |
Cisco IOS | =15.5\(3\)s3 | |
Cisco IOS | =15.5\(3\)s4 | |
Cisco IOS | =15.5\(3\)s5 | |
Cisco IOS | =15.5\(3\)s6 | |
Cisco IOS | =15.5\(3\)s6a | |
Cisco IOS | =15.5\(3\)s6b | |
Cisco IOS | =15.5\(3\)s7 | |
Cisco IOS | =15.6\(1\)s | |
Cisco IOS | =15.6\(1\)s1 | |
Cisco IOS | =15.6\(1\)s2 | |
Cisco IOS | =15.6\(1\)s3 | |
Cisco IOS | =15.6\(1\)s4 | |
Cisco IOS | =15.6\(1\)sn | |
Cisco IOS | =15.6\(1\)sn1 | |
Cisco IOS | =15.6\(1\)sn2 | |
Cisco IOS | =15.6\(1\)sn3 | |
Cisco IOS | =15.6\(1\)t | |
Cisco IOS | =15.6\(1\)t0a | |
Cisco IOS | =15.6\(1\)t1 | |
Cisco IOS | =15.6\(1\)t2 | |
Cisco IOS | =15.6\(1\)t3 | |
Cisco IOS | =15.6\(2\)s | |
Cisco IOS | =15.6\(2\)s1 | |
Cisco IOS | =15.6\(2\)s2 | |
Cisco IOS | =15.6\(2\)s3 | |
Cisco IOS | =15.6\(2\)s4 | |
Cisco IOS | =15.6\(2\)sn | |
Cisco IOS | =15.6\(2\)sp | |
Cisco IOS | =15.6\(2\)sp1 | |
Cisco IOS | =15.6\(2\)sp2 | |
Cisco IOS | =15.6\(2\)sp3 | |
Cisco IOS | =15.6\(2\)sp3b | |
Cisco IOS | =15.6\(2\)sp4 | |
Cisco IOS | =15.6\(2\)t | |
Cisco IOS | =15.6\(2\)t0a | |
Cisco IOS | =15.6\(2\)t1 | |
Cisco IOS | =15.6\(2\)t2 | |
Cisco IOS | =15.6\(2\)t3 | |
Cisco IOS | =15.6\(3\)m | |
Cisco IOS | =15.6\(3\)m0a | |
Cisco IOS | =15.6\(3\)m1 | |
Cisco IOS | =15.6\(3\)m1a | |
Cisco IOS | =15.6\(3\)m1b | |
Cisco IOS | =15.6\(3\)m2 | |
Cisco IOS | =15.6\(3\)m2a | |
Cisco IOS | =15.6\(3\)m3 | |
Cisco IOS | =15.6\(3\)m3a | |
Cisco IOS | =15.6\(3\)m4 | |
Cisco IOS | =15.6\(3\)sn | |
Cisco IOS | =15.6\(4\)sn | |
Cisco IOS | =15.6\(5\)sn | |
Cisco IOS | =15.6\(6\)sn | |
Cisco IOS | =15.6\(7\)sn | |
Cisco IOS | =15.7\(3\)m | |
Cisco IOS | =15.7\(3\)m0a | |
Cisco IOS | =15.7\(3\)m1 | |
Cisco IOS | =15.7\(3\)m2 | |
Cisco IOS XE Software | =3.6.4e | |
Cisco IOS XE Software | =3.6.5ae | |
Cisco IOS XE Software | =3.6.5be | |
Cisco IOS XE Software | =3.6.5e | |
Cisco IOS XE Software | =3.6.6e | |
Cisco IOS XE Software | =3.6.7ae | |
Cisco IOS XE Software | =3.6.7be | |
Cisco IOS XE Software | =3.6.7e | |
Cisco IOS XE Software | =3.6.8e | |
Cisco IOS XE Software | =3.7.4e | |
Cisco IOS XE Software | =3.7.5e | |
Cisco IOS XE Software | =3.8.2e | |
Cisco IOS XE Software | =3.8.3e | |
Cisco IOS XE Software | =3.8.4e | |
Cisco IOS XE Software | =3.8.5ae | |
Cisco IOS XE Software | =3.8.5e | |
Cisco IOS XE Software | =3.8.6e | |
Cisco IOS XE Software | =3.9.0e | |
Cisco IOS XE Software | =3.9.1e | |
Cisco IOS XE Software | =3.9.2be | |
Cisco IOS XE Software | =3.9.2e | |
Cisco IOS XE Software | =3.10.0ce | |
Cisco IOS XE Software | =3.10.0e | |
Cisco IOS XE Software | =3.10.1ae | |
Cisco IOS XE Software | =3.10.1e | |
Cisco IOS XE Software | =3.10.1se | |
Cisco IOS XE Software | =3.16.1as | |
Cisco IOS XE Software | =3.16.1s | |
Cisco IOS XE Software | =3.16.2as | |
Cisco IOS XE Software | =3.16.2bs | |
Cisco IOS XE Software | =3.16.2s | |
Cisco IOS XE Software | =3.16.3as | |
Cisco IOS XE Software | =3.16.3s | |
Cisco IOS XE Software | =3.16.4as | |
Cisco IOS XE Software | =3.16.4bs | |
Cisco IOS XE Software | =3.16.4cs | |
Cisco IOS XE Software | =3.16.4ds | |
Cisco IOS XE Software | =3.16.4es | |
Cisco IOS XE Software | =3.16.4gs | |
Cisco IOS XE Software | =3.16.4s | |
Cisco IOS XE Software | =3.16.5as | |
Cisco IOS XE Software | =3.16.5bs | |
Cisco IOS XE Software | =3.16.5s | |
Cisco IOS XE Software | =3.16.6bs | |
Cisco IOS XE Software | =3.16.6s | |
Cisco IOS XE Software | =3.16.7as | |
Cisco IOS XE Software | =3.16.7bs | |
Cisco IOS XE Software | =3.16.7s | |
Cisco IOS XE Software | =3.17.0s | |
Cisco IOS XE Software | =3.17.1as | |
Cisco IOS XE Software | =3.17.1s | |
Cisco IOS XE Software | =3.17.3s | |
Cisco IOS XE Software | =3.17.4s | |
Cisco IOS XE Software | =3.18.0as | |
Cisco IOS XE Software | =3.18.0s | |
Cisco IOS XE Software | =3.18.0sp | |
Cisco IOS XE Software | =3.18.1asp | |
Cisco IOS XE Software | =3.18.1bsp | |
Cisco IOS XE Software | =3.18.1csp | |
Cisco IOS XE Software | =3.18.1gsp | |
Cisco IOS XE Software | =3.18.1hsp | |
Cisco IOS XE Software | =3.18.1isp | |
Cisco IOS XE Software | =3.18.1s | |
Cisco IOS XE Software | =3.18.1sp | |
Cisco IOS XE Software | =3.18.2asp | |
Cisco IOS XE Software | =3.18.2s | |
Cisco IOS XE Software | =3.18.2sp | |
Cisco IOS XE Software | =3.18.3asp | |
Cisco IOS XE Software | =3.18.3bsp | |
Cisco IOS XE Software | =3.18.3s | |
Cisco IOS XE Software | =3.18.3sp | |
Cisco IOS XE Software | =3.18.4s | |
Cisco IOS XE Software | =3.18.4sp | |
Cisco IOS XE Software | =16.2.1 | |
Cisco IOS XE Software | =16.2.2 | |
Cisco IOS XE Software | =16.3.1 | |
Cisco IOS XE Software | =16.3.1a | |
Cisco IOS XE Software | =16.3.2 | |
Cisco IOS XE Software | =16.3.3 | |
Cisco IOS XE Software | =16.3.4 | |
Cisco IOS XE Software | =16.3.5 | |
Cisco IOS XE Software | =16.3.5b | |
Cisco IOS XE Software | =16.3.6 | |
Cisco IOS XE Software | =16.4.1 | |
Cisco IOS XE Software | =16.4.2 | |
Cisco IOS XE Software | =16.4.3 | |
Cisco IOS XE Software | =16.5.1 | |
Cisco IOS XE Software | =16.5.1a | |
Cisco IOS XE Software | =16.5.1b | |
Cisco IOS XE Software | =16.5.2 | |
Cisco IOS XE Software | =16.5.3 | |
Cisco IOS XE Software | =16.6.1 | |
Cisco IOS XE Software | =16.6.2 | |
Cisco IOS XE Software | =16.6.3 | |
Cisco IOS XE Software | =16.7.1 | |
Cisco IOS XE Software | =16.7.1a | |
Cisco IOS XE Software | =16.7.1b | |
Cisco IOS XE Software | =16.7.2 | |
Cisco IOS XE Software | =16.8.1 | |
Cisco IOS XE Software | =16.8.1a | |
Cisco IOS XE Software | =16.8.1b | |
Cisco IOS XE Software | =16.8.1c | |
Cisco IOS XE Software | =16.8.1d | |
Cisco IOS XE Software | =16.8.1s | |
Cisco IOS XE Software | =16.8.2 | |
Cisco IOS XE Software | =16.9.1b | |
Cisco IOS XE Software | =16.9.1c | |
Cisco IOS XE Software | =16.9.1s | |
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1757 is rated as high due to its potential for unauthorized read access to sensitive data.
To mitigate CVE-2019-1757, update to the latest Cisco IOS or IOS XE version as recommended in the security advisory.
CVE-2019-1757 affects various versions of Cisco IOS and IOS XE software with the Smart Call Home feature enabled.
Yes, CVE-2019-1757 can be exploited by an unauthenticated remote attacker.
CVE-2019-1757 allows attackers to gain unauthorized read access to sensitive data using an invalid certificate.