Lucene search

K
cve[email protected]CVE-2019-1842
HistoryJun 05, 2019 - 5:29 p.m.

CVE-2019-1842

2019-06-0517:29:00
CWE-285
CWE-287
web.nvd.nist.gov
35
cve-2019-1842
cisco
ios xr
software
ssh
authentication
vulnerability
remote
attack
logic error
data misrepresentation
user enumeration
command authorization bypass

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.6%

A vulnerability in the Secure Shell (SSH) authentication function of Cisco IOS XR Software could allow an authenticated, remote attacker to successfully log in to an affected device using two distinct usernames. The vulnerability is due to a logic error that may occur when certain sequences of actions are processed during an SSH login event on the affected device. An attacker could exploit this vulnerability by initiating an SSH session to the device with a specific sequence that presents the two usernames. A successful exploit could result in logging data misrepresentation, user enumeration, or, in certain circumstances, a command authorization bypass. See the Details section for more information.

Affected configurations

NVD
Node
ciscoios_xr_firmwareMatch6.1.2.tools
OR
ciscoios_xr_firmwareMatch6.1.3.tools
OR
ciscoios_xr_firmwareMatch6.2.3.tools
OR
ciscoios_xr_firmwareMatch6.4.2.tools
AND
ciscoasr_9001Match-
OR
ciscoasr_9006Match-
OR
ciscoasr_9010Match-
OR
ciscoasr_9901Match-
OR
ciscoasr_9904Match-
OR
ciscoasr_9906Match-
OR
ciscoasr_9910Match-
OR
ciscoasr_9912Match-
OR
ciscoasr_9922Match-
OR
ciscocrs-1_16-slot_line_card_chassisMatch-
OR
ciscocrs-1_16-slot_single-shelf_systemMatch-
OR
ciscocrs-1_4-slot_single-shelf_systemMatch-
OR
ciscocrs-1_8-slot_line_card_chassisMatch-
OR
ciscocrs-1_8-slot_single-shelf_systemMatch-
OR
ciscocrs-1_fabric_card_chassisMatch-
OR
ciscocrs-1_line_card_chassis_\(dual\)Match-
OR
ciscocrs-1_line_card_chassis_\(multi\)Match-
OR
ciscocrs-1_multishelf_systemMatch-
OR
ciscocrs-3_16-slot_single-shelf_systemMatch-
OR
ciscocrs-3_4-slot_single-shelf_systemMatch-
OR
ciscocrs-3_8-slot_single-shelf_systemMatch-
OR
ciscocrs-3_multishelf_systemMatch-
OR
ciscocrs-8\/s-b_crsMatch-
OR
ciscocrs-8\/scrsMatch-
OR
ciscocrs-x_16-slot_single-shelf_systemMatch-
OR
ciscocrs-x_multishelf_systemMatch-
OR
cisconcs_6008-8-slot_chassisMatch-
OR
cisconetwork_convergence_system_5508Match-

CNA Affected

[
  {
    "product": "Cisco IOS XR Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "lessThan": "6.1.4",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.6%