ID
VAR-E-201902-0457
CVE
cve_id: | CVE-2019-1681 | Trust: 0.3 |
TITLE
Cisco Network Convergence System 1000 Series CVE-2019-1681 Directory Traversal Vulnerability
Trust: 0.3
DESCRIPTION
Cisco Network Convergence System 1000 Series is prone to a directory-traversal vulnerability.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
This issue is tracked by Cisco Bug ID CSCvk32415.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios xr | scope: | eq | version: | 5.1 | Trust: 0.6 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.3 | Trust: 0.6 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.7 | Trust: 0.6 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.6 | Trust: 0.6 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.5 | Trust: 0.6 |
vendor: | cisco | model: | network convergence system series 6.5.1.base | scope: | eq | version: | 1000 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 6.4.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 5.1.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.3.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.2.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.2.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.1.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.0.11 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.0.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.0.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.9.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.9 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.8.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.8.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.8.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.8.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.8 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.7.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.7.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.7.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.6.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.6.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.6.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.5.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.5.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.5.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.5.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.4.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.4.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.4.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.3.5 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.3.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.3.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.3.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.2.50 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.2.6 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.2.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.2.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.2.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.2.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.1.0 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 5.3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.3.4 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.2.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.2.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.1.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.1.0 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.0.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.0.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 4.0.0 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | eq | version: | 3.9.2 | Trust: 0.3 |
vendor: | cisco | model: | network convergence system series 7.0.1.19i.base | scope: | ne | version: | 1000 | Trust: 0.3 |
vendor: | cisco | model: | network convergence system series 6.6.11.12i.base | scope: | ne | version: | 1000 | Trust: 0.3 |
vendor: | cisco | model: | network convergence system series 6.6.1.19i.base | scope: | ne | version: | 1000 | Trust: 0.3 |
vendor: | cisco | model: | network convergence system series 6.5.2.9i.base | scope: | ne | version: | 1000 | Trust: 0.3 |
vendor: | cisco | model: | network convergence system series 6.5.2.10i.base | scope: | ne | version: | 1000 | Trust: 0.3 |
vendor: | cisco | model: | ios xr | scope: | ne | version: | 6.5.2 | Trust: 0.3 |
EXPLOIT
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.
Bullet list:
<li><a href="/data/vulnerabilities/exploits/49053.py">/data/vulnerabilities/exploits/49053.py</a></li>
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Input Validation Error
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2019-1681 | Trust: 0.3 |
db: | BID | id: | 107107 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/ | Trust: 0.3 |
url: | https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190220-ncs | Trust: 0.3 |
SOURCES
db: | BID | id: | 107107 |
LAST UPDATE DATE
2022-07-27T09:39:50.726000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 107107 | date: | 2019-02-20T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 107107 | date: | 2019-02-20T00:00:00 |