ID

VAR-201906-0570


CVE

CVE-2019-1623


TITLE

Cisco Meeting Server Command injection vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2019-005672 // CNNVD: CNNVD-201906-805

DESCRIPTION

A vulnerability in the CLI configuration shell of Cisco Meeting Server could allow an authenticated, local attacker to inject arbitrary commands as the root user. The vulnerability is due to insufficient input validation during the execution of a vulnerable CLI command. An attacker with administrator-level credentials could exploit this vulnerability by injecting crafted arguments during command execution. A successful exploit could allow the attacker to perform arbitrary code execution as root on an affected product. Cisco Meeting Server Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Meeting Server is prone to local command-injection vulnerability. This issue is being tracked by Cisco Bug ID CSCvk42093

Trust: 1.98

sources: NVD: CVE-2019-1623 // JVNDB: JVNDB-2019-005672 // BID: 108840 // VULHUB: VHN-148355

AFFECTED PRODUCTS

vendor:ciscomodel:meeting serverscope:ltversion:2.3.8

Trust: 1.0

vendor:ciscomodel:meeting serverscope:gteversion:2.2.0

Trust: 1.0

vendor:ciscomodel:meeting serverscope:ltversion:2.2.14

Trust: 1.0

vendor:ciscomodel:meeting serverscope:gteversion:2.3.0

Trust: 1.0

vendor:ciscomodel:meeting serverscope: - version: -

Trust: 0.8

vendor:ciscomodel:meeting serverscope:eqversion:2.3.3

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1.12

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1.11

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1.10

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1.9

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1.8

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1.4

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.0.16

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.0.15

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.0.7

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.0.3

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.0.2

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.0.1

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:1.9

Trust: 0.3

vendor:ciscomodel:meeting serverscope:neversion:2.3.8

Trust: 0.3

vendor:ciscomodel:meeting serverscope:neversion:2.2.14

Trust: 0.3

sources: BID: 108840 // JVNDB: JVNDB-2019-005672 // NVD: CVE-2019-1623

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1623
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1623
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1623
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201906-805
value: MEDIUM

Trust: 0.6

VULHUB: VHN-148355
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1623
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148355
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1623
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1623
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-148355 // JVNDB: JVNDB-2019-005672 // CNNVD: CNNVD-201906-805 // NVD: CVE-2019-1623 // NVD: CVE-2019-1623

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.9

problemtype:CWE-78

Trust: 1.1

sources: VULHUB: VHN-148355 // JVNDB: JVNDB-2019-005672 // NVD: CVE-2019-1623

THREAT TYPE

local

Trust: 0.9

sources: BID: 108840 // CNNVD: CNNVD-201906-805

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201906-805

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-005672

PATCH

title:cisco-sa-20190619-cms-codexurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-cms-codex

Trust: 0.8

title:Cisco Meeting Server Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93954

Trust: 0.6

sources: JVNDB: JVNDB-2019-005672 // CNNVD: CNNVD-201906-805

EXTERNAL IDS

db:NVDid:CVE-2019-1623

Trust: 2.8

db:BIDid:108840

Trust: 2.0

db:JVNDBid:JVNDB-2019-005672

Trust: 0.8

db:CNNVDid:CNNVD-201906-805

Trust: 0.7

db:AUSCERTid:ESB-2019.2205

Trust: 0.6

db:VULHUBid:VHN-148355

Trust: 0.1

sources: VULHUB: VHN-148355 // BID: 108840 // JVNDB: JVNDB-2019-005672 // CNNVD: CNNVD-201906-805 // NVD: CVE-2019-1623

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190619-cms-codex

Trust: 2.0

url:http://www.securityfocus.com/bid/108840

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-1623

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1623

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.2205/

Trust: 0.6

sources: VULHUB: VHN-148355 // BID: 108840 // JVNDB: JVNDB-2019-005672 // CNNVD: CNNVD-201906-805 // NVD: CVE-2019-1623

CREDITS

Cisco.

Trust: 0.9

sources: BID: 108840 // CNNVD: CNNVD-201906-805

SOURCES

db:VULHUBid:VHN-148355
db:BIDid:108840
db:JVNDBid:JVNDB-2019-005672
db:CNNVDid:CNNVD-201906-805
db:NVDid:CVE-2019-1623

LAST UPDATE DATE

2024-11-23T22:16:58.614000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148355date:2020-10-16T00:00:00
db:BIDid:108840date:2019-06-19T00:00:00
db:JVNDBid:JVNDB-2019-005672date:2019-06-25T00:00:00
db:CNNVDid:CNNVD-201906-805date:2020-10-21T00:00:00
db:NVDid:CVE-2019-1623date:2024-11-21T04:36:57.260

SOURCES RELEASE DATE

db:VULHUBid:VHN-148355date:2019-06-20T00:00:00
db:BIDid:108840date:2019-06-19T00:00:00
db:JVNDBid:JVNDB-2019-005672date:2019-06-25T00:00:00
db:CNNVDid:CNNVD-201906-805date:2019-06-19T00:00:00
db:NVDid:CVE-2019-1623date:2019-06-20T03:15:11.213