First published: Wed Aug 07 2019(Updated: )
Multiple vulnerabilities in the smart tunnel functionality of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, local attacker to elevate privileges to the root user or load a malicious library file while the tunnel is being established. For more information about these vulnerabilities, see the Details section of this security advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | <9.4.4.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1944 has been designated a high severity rating due to its potential for privilege escalation.
To mitigate CVE-2019-1944, update your Cisco Adaptive Security Appliance Software to at least version 9.4.4.37 or a later fixed version.
CVE-2019-1944 affects users of the Cisco Adaptive Security Appliance Software prior to version 9.4.4.37.
CVE-2019-1944 allows authenticated local attackers to elevate their privileges to the root user or load malicious library files.
CVE-2019-1944 is not a remote vulnerability; it requires local authenticated access to exploit.