CWE
295
Advisory Published
Updated

CVE-2019-1757: Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability

First published: Thu Mar 28 2019(Updated: )

A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco IOS=2.3
Cisco IOS=12.2\(6\)i1
Cisco IOS=12.4\(25e\)jap1m
Cisco IOS=12.4\(25e\)jap2
Cisco IOS=12.4\(25e\)jap26
Cisco IOS=12.4\(25e\)jaz1
Cisco IOS=15.1\(2\)sg8a
Cisco IOS=15.1\(3\)svg3d
Cisco IOS=15.1\(3\)svi1b
Cisco IOS=15.1\(3\)svm3
Cisco IOS=15.1\(3\)svn2
Cisco IOS=15.1\(3\)svo1
Cisco IOS=15.1\(3\)svo2
Cisco IOS=15.1\(3\)svp1
Cisco IOS=15.1\(4\)m12c
Cisco IOS=15.2\(2\)e4
Cisco IOS=15.2\(2\)e5
Cisco IOS=15.2\(2\)e5a
Cisco IOS=15.2\(2\)e5b
Cisco IOS=15.2\(2\)e6
Cisco IOS=15.2\(2\)e7
Cisco IOS=15.2\(2\)e7b
Cisco IOS=15.2\(2\)e8
Cisco IOS=15.2\(3\)e4
Cisco IOS=15.2\(3\)e5
Cisco IOS=15.2\(3\)ea1
Cisco IOS=15.2\(4\)e2
Cisco IOS=15.2\(4\)e3
Cisco IOS=15.2\(4\)e4
Cisco IOS=15.2\(4\)e5
Cisco IOS=15.2\(4\)e5a
Cisco IOS=15.2\(4\)e6
Cisco IOS=15.2\(4\)ea8
Cisco IOS=15.2\(4\)ea9
Cisco IOS=15.2\(4\)jaz1
Cisco IOS=15.2\(4\)jn1
Cisco IOS=15.2\(4a\)ea5
Cisco IOS=15.2\(4m\)e2
Cisco IOS=15.2\(4m\)e3
Cisco IOS=15.2\(4n\)e2
Cisco IOS=15.2\(4o\)e2
Cisco IOS=15.2\(4o\)e3
Cisco IOS=15.2\(4p\)e1
Cisco IOS=15.2\(4q\)e1
Cisco IOS=15.2\(4s\)e1
Cisco IOS=15.2\(4s\)e2
Cisco IOS=15.2\(5\)e
Cisco IOS=15.2\(5\)e1
Cisco IOS=15.2\(5\)e2
Cisco IOS=15.2\(5\)e2b
Cisco IOS=15.2\(5\)e2c
Cisco IOS=15.2\(5\)ea
Cisco IOS=15.2\(5\)ex
Cisco IOS=15.2\(5a\)e
Cisco IOS=15.2\(5a\)e1
Cisco IOS=15.2\(5b\)e
Cisco IOS=15.2\(5c\)e
Cisco IOS=15.2\(6\)e
Cisco IOS=15.2\(6\)e0a
Cisco IOS=15.2\(6\)e0c
Cisco IOS=15.2\(6\)e1
Cisco IOS=15.2\(6\)e1a
Cisco IOS=15.2\(6\)e1s
Cisco IOS=15.3\(3\)ja1n
Cisco IOS=15.3\(3\)jd15
Cisco IOS=15.3\(3\)jda15
Cisco IOS=15.3\(3\)jf35
Cisco IOS=15.3\(3\)ji
Cisco IOS=15.3\(3\)ji2
Cisco IOS=15.3\(3\)jn1
Cisco IOS=15.3\(3\)jn2
Cisco IOS=15.5\(3\)s1
Cisco IOS=15.5\(3\)s1a
Cisco IOS=15.5\(3\)s2
Cisco IOS=15.5\(3\)s3
Cisco IOS=15.5\(3\)s4
Cisco IOS=15.5\(3\)s5
Cisco IOS=15.5\(3\)s6
Cisco IOS=15.5\(3\)s6a
Cisco IOS=15.5\(3\)s6b
Cisco IOS=15.5\(3\)s7
Cisco IOS=15.6\(1\)s
Cisco IOS=15.6\(1\)s1
Cisco IOS=15.6\(1\)s2
Cisco IOS=15.6\(1\)s3
Cisco IOS=15.6\(1\)s4
Cisco IOS=15.6\(1\)sn
Cisco IOS=15.6\(1\)sn1
Cisco IOS=15.6\(1\)sn2
Cisco IOS=15.6\(1\)sn3
Cisco IOS=15.6\(1\)t
Cisco IOS=15.6\(1\)t0a
Cisco IOS=15.6\(1\)t1
Cisco IOS=15.6\(1\)t2
Cisco IOS=15.6\(1\)t3
Cisco IOS=15.6\(2\)s
Cisco IOS=15.6\(2\)s1
Cisco IOS=15.6\(2\)s2
Cisco IOS=15.6\(2\)s3
Cisco IOS=15.6\(2\)s4
Cisco IOS=15.6\(2\)sn
Cisco IOS=15.6\(2\)sp
Cisco IOS=15.6\(2\)sp1
Cisco IOS=15.6\(2\)sp2
Cisco IOS=15.6\(2\)sp3
Cisco IOS=15.6\(2\)sp3b
Cisco IOS=15.6\(2\)sp4
Cisco IOS=15.6\(2\)t
Cisco IOS=15.6\(2\)t0a
Cisco IOS=15.6\(2\)t1
Cisco IOS=15.6\(2\)t2
Cisco IOS=15.6\(2\)t3
Cisco IOS=15.6\(3\)m
Cisco IOS=15.6\(3\)m0a
Cisco IOS=15.6\(3\)m1
Cisco IOS=15.6\(3\)m1a
Cisco IOS=15.6\(3\)m1b
Cisco IOS=15.6\(3\)m2
Cisco IOS=15.6\(3\)m2a
Cisco IOS=15.6\(3\)m3
Cisco IOS=15.6\(3\)m3a
Cisco IOS=15.6\(3\)m4
Cisco IOS=15.6\(3\)sn
Cisco IOS=15.6\(4\)sn
Cisco IOS=15.6\(5\)sn
Cisco IOS=15.6\(6\)sn
Cisco IOS=15.6\(7\)sn
Cisco IOS=15.7\(3\)m
Cisco IOS=15.7\(3\)m0a
Cisco IOS=15.7\(3\)m1
Cisco IOS=15.7\(3\)m2
Cisco IOS XE Software=3.6.4e
Cisco IOS XE Software=3.6.5ae
Cisco IOS XE Software=3.6.5be
Cisco IOS XE Software=3.6.5e
Cisco IOS XE Software=3.6.6e
Cisco IOS XE Software=3.6.7ae
Cisco IOS XE Software=3.6.7be
Cisco IOS XE Software=3.6.7e
Cisco IOS XE Software=3.6.8e
Cisco IOS XE Software=3.7.4e
Cisco IOS XE Software=3.7.5e
Cisco IOS XE Software=3.8.2e
Cisco IOS XE Software=3.8.3e
Cisco IOS XE Software=3.8.4e
Cisco IOS XE Software=3.8.5ae
Cisco IOS XE Software=3.8.5e
Cisco IOS XE Software=3.8.6e
Cisco IOS XE Software=3.9.0e
Cisco IOS XE Software=3.9.1e
Cisco IOS XE Software=3.9.2be
Cisco IOS XE Software=3.9.2e
Cisco IOS XE Software=3.10.0ce
Cisco IOS XE Software=3.10.0e
Cisco IOS XE Software=3.10.1ae
Cisco IOS XE Software=3.10.1e
Cisco IOS XE Software=3.10.1se
Cisco IOS XE Software=3.16.1as
Cisco IOS XE Software=3.16.1s
Cisco IOS XE Software=3.16.2as
Cisco IOS XE Software=3.16.2bs
Cisco IOS XE Software=3.16.2s
Cisco IOS XE Software=3.16.3as
Cisco IOS XE Software=3.16.3s
Cisco IOS XE Software=3.16.4as
Cisco IOS XE Software=3.16.4bs
Cisco IOS XE Software=3.16.4cs
Cisco IOS XE Software=3.16.4ds
Cisco IOS XE Software=3.16.4es
Cisco IOS XE Software=3.16.4gs
Cisco IOS XE Software=3.16.4s
Cisco IOS XE Software=3.16.5as
Cisco IOS XE Software=3.16.5bs
Cisco IOS XE Software=3.16.5s
Cisco IOS XE Software=3.16.6bs
Cisco IOS XE Software=3.16.6s
Cisco IOS XE Software=3.16.7as
Cisco IOS XE Software=3.16.7bs
Cisco IOS XE Software=3.16.7s
Cisco IOS XE Software=3.17.0s
Cisco IOS XE Software=3.17.1as
Cisco IOS XE Software=3.17.1s
Cisco IOS XE Software=3.17.3s
Cisco IOS XE Software=3.17.4s
Cisco IOS XE Software=3.18.0as
Cisco IOS XE Software=3.18.0s
Cisco IOS XE Software=3.18.0sp
Cisco IOS XE Software=3.18.1asp
Cisco IOS XE Software=3.18.1bsp
Cisco IOS XE Software=3.18.1csp
Cisco IOS XE Software=3.18.1gsp
Cisco IOS XE Software=3.18.1hsp
Cisco IOS XE Software=3.18.1isp
Cisco IOS XE Software=3.18.1s
Cisco IOS XE Software=3.18.1sp
Cisco IOS XE Software=3.18.2asp
Cisco IOS XE Software=3.18.2s
Cisco IOS XE Software=3.18.2sp
Cisco IOS XE Software=3.18.3asp
Cisco IOS XE Software=3.18.3bsp
Cisco IOS XE Software=3.18.3s
Cisco IOS XE Software=3.18.3sp
Cisco IOS XE Software=3.18.4s
Cisco IOS XE Software=3.18.4sp
Cisco IOS XE Software=16.2.1
Cisco IOS XE Software=16.2.2
Cisco IOS XE Software=16.3.1
Cisco IOS XE Software=16.3.1a
Cisco IOS XE Software=16.3.2
Cisco IOS XE Software=16.3.3
Cisco IOS XE Software=16.3.4
Cisco IOS XE Software=16.3.5
Cisco IOS XE Software=16.3.5b
Cisco IOS XE Software=16.3.6
Cisco IOS XE Software=16.4.1
Cisco IOS XE Software=16.4.2
Cisco IOS XE Software=16.4.3
Cisco IOS XE Software=16.5.1
Cisco IOS XE Software=16.5.1a
Cisco IOS XE Software=16.5.1b
Cisco IOS XE Software=16.5.2
Cisco IOS XE Software=16.5.3
Cisco IOS XE Software=16.6.1
Cisco IOS XE Software=16.6.2
Cisco IOS XE Software=16.6.3
Cisco IOS XE Software=16.7.1
Cisco IOS XE Software=16.7.1a
Cisco IOS XE Software=16.7.1b
Cisco IOS XE Software=16.7.2
Cisco IOS XE Software=16.8.1
Cisco IOS XE Software=16.8.1a
Cisco IOS XE Software=16.8.1b
Cisco IOS XE Software=16.8.1c
Cisco IOS XE Software=16.8.1d
Cisco IOS XE Software=16.8.1s
Cisco IOS XE Software=16.8.2
Cisco IOS XE Software=16.9.1b
Cisco IOS XE Software=16.9.1c
Cisco IOS XE Software=16.9.1s
Cisco IOS XE Software

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-1757?

    The severity of CVE-2019-1757 is rated as high due to its potential for unauthorized read access to sensitive data.

  • How do I fix CVE-2019-1757?

    To mitigate CVE-2019-1757, update to the latest Cisco IOS or IOS XE version as recommended in the security advisory.

  • What types of systems are affected by CVE-2019-1757?

    CVE-2019-1757 affects various versions of Cisco IOS and IOS XE software with the Smart Call Home feature enabled.

  • Can CVE-2019-1757 be exploited remotely?

    Yes, CVE-2019-1757 can be exploited by an unauthenticated remote attacker.

  • What does CVE-2019-1757 vulnerability allow attackers to do?

    CVE-2019-1757 allows attackers to gain unauthorized read access to sensitive data using an invalid certificate.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203