First published: Wed Aug 07 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to elevate privileges and execute administrative functions on an affected device. The vulnerability is due to insufficient authorization validation. An attacker could exploit this vulnerability by logging in to an affected device as a low-privileged user and then sending specific HTTPS requests to execute administrative functions using the information retrieved during initial login.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | <=8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1934 is rated as a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2019-1934, update Cisco Adaptive Security Appliance Software to a version that addresses the vulnerability.
CVE-2019-1934 affects authenticated users of Cisco Adaptive Security Appliance Software versions up to 8.2.
An authenticated, remote attacker can exploit CVE-2019-1934 to elevate privileges and execute administrative functions.
CVE-2019-1934 is an authenticated vulnerability that requires the attacker to have valid credentials.