First published: Thu May 16 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <3.0.1 | |
Cisco Prime Infrastructure | <3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1822 is a vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager.
CVE-2019-1822 has a severity rating of 7.2 (Critical).
CVE-2019-1822 allows an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system of Cisco Prime Infrastructure.
CVE-2019-1822 allows an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system of Cisco Evolved Programmable Network Manager.
Apply the necessary patches and updates provided by Cisco to fix CVE-2019-1822.