First published: Sat Jul 06 2019(Updated: )
A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device as root. The vulnerability is due to insufficient input validation of a configuration file that is accessible to a local shell user. An attacker could exploit this vulnerability by including malicious input during the execution of this file. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Enterprise NFV Infrastructure Software | =3.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1893 is a vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) that could allow an authenticated, local attacker to execute arbitrary commands as root.
CVE-2019-1893 has a severity score of 7.8, which is considered high.
CVE-2019-1893 occurs due to insufficient input validation of a configuration file in Cisco Enterprise NFV Infrastructure Software.
Version 3.9.1 of Cisco Enterprise NFV Infrastructure Software is affected by CVE-2019-1893.
Yes, Cisco has released a security advisory which provides information on how to mitigate the vulnerability.