First published: Thu Jun 20 2019(Updated: )
A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to access sensitive information or cause a denial of service (DoS) condition. The vulnerability is due to improper restrictions on XML entities. An attacker could exploit this vulnerability by sending malicious requests to a targeted system that contain references within XML entities. An exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the application to consume available resources, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Security Manager | =4.14-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1903 is high due to its potential to allow unauthorized access to sensitive information and cause denial of service.
To fix CVE-2019-1903, upgrade to the latest version of Cisco Security Manager that addresses this vulnerability.
CVE-2019-1903 affects users of Cisco Security Manager version 4.14-sp2.
An attacker can execute remote code execution or denial of service attacks through CVE-2019-1903 due to improper restrictions on XML entities.
No, authentication is not required to exploit CVE-2019-1903, allowing unauthenticated attackers to exploit it.