{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T11:40:29.757","vulnerabilities":[{"cve":{"id":"CVE-2019-1626","sourceIdentifier":"psirt@cisco.com","published":"2019-06-20T03:15:11.433","lastModified":"2024-11-21T04:36:57.660","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de usuario basada en web (Web UI) de vManage de SD-WAN Solution de Cisco, podría permitir a un atacante remoto autenticado obtener privilegios elevados en un dispositivo vManage afectado. Una vulnerabilidad es debido a un fallo al no autorizar apropiadamente ciertas acciones del usuario en la configuración del dispositivo. Un atacante podría explotar esta vulnerabilidad iniciando sesión en la interfaz de usuario web de vManage y enviando peticiones HTTP creadas hacia vManage. Una explotación con éxito podría permitir a los atacantes obtener privilegios elevados y realizar cambios en la configuración que regularmente no estarían autorizados a realizar."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"18.3.6","matchCriteriaId":"34DA4069-51E1-41F3-8643-E7436C0DAC6D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*","matchCriteriaId":"5D71E4AF-6E91-4493-A591-4D056D0E59C1"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*","matchCriteriaId":"F718A859-BCDB-4DD0-819D-60ABE710F0A9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*","matchCriteriaId":"07E7851F-3E72-4677-B907-CF777EBED2FF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*","matchCriteriaId":"52EEF288-492C-4CE6-A082-631005C5E711"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*","matchCriteriaId":"C0C5E2C9-7D4B-405C-93DD-33DF265131E2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*","matchCriteriaId":"36973815-F46D-4ADA-B9DF-BCB70AC60BD3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*","matchCriteriaId":"061A302C-8D35-4E80-93DA-916DA7E90C06"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/108838","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/108838","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privilescal","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}