{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T08:54:48.220","vulnerabilities":[{"cve":{"id":"CVE-2019-1743","sourceIdentifier":"psirt@cisco.com","published":"2019-03-28T00:29:00.483","lastModified":"2024-11-21T04:37:15.510","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web UI framework of Cisco IOS XE Software could allow an authenticated, remote attacker to make unauthorized changes to the filesystem of the affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the device. An exploit could allow the attacker to gain elevated privileges on the affected device."},{"lang":"es","value":"Una vulnerabilidad en el framework de la interfaz web del software Cisco IOS XE podría permitir que un atacante remoto autenticado realice cambios no autorizados en el sistema de archivos del dispositivo afectado. Esta vulnerabilidad se debe a una validación de entradas incorrecta. Un atacante podría explotar esta vulnerabilidad manipulando un archivo malicioso y subiéndolo al dispositivo. Un exploit podría permitir que el atacante obtenga privilegios elevados en el dispositivo afectado."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*","matchCriteriaId":"89526731-B712-43D3-B451-D7FC503D2D65"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*","matchCriteriaId":"302933FE-4B6A-48A3-97F0-4B943251B717"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*","matchCriteriaId":"296636F1-9242-429B-8472-90352C056106"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*","matchCriteriaId":"77993343-0394-413F-ABF9-C1215E9AD800"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*","matchCriteriaId":"283971DD-DD58-4A76-AC2A-F316534ED416"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*","matchCriteriaId":"A8F324A5-4830-482E-A684-AB3B6594CEAE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*","matchCriteriaId":"E8120196-8648-49D0-8262-CD4C9C90C37A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*","matchCriteriaId":"33E7CCE2-C685-4019-9B55-B3BECB3E5F76"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*","matchCriteriaId":"0699DD6E-BA74-4814-93AB-300329C9D032"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*","matchCriteriaId":"C2E2D781-2684-45F1-AC52-636572A0DCA8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*","matchCriteriaId":"77E8AF15-AB46-4EAB-8872-8C55E8601599"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*","matchCriteriaId":"957318BE-55D4-4585-AA52-C813301D01C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*","matchCriteriaId":"8F11B703-8A0F-47ED-AA70-951FF78B94A4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*","matchCriteriaId":"FE7B2557-821D-4E05-B5C3-67192573D97D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*","matchCriteriaId":"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*","matchCriteriaId":"187F699A-AF2F-42B0-B855-27413140C384"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*","matchCriteriaId":"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*","matchCriteriaId":"62EDEC28-661E-42EF-88F0-F62D0220D2E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*","matchCriteriaId":"F821EBD7-91E2-4460-BFAF-18482CF6CB8C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*","matchCriteriaId":"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*","matchCriteriaId":"C9B825E6-5929-4890-BDBA-4CF4BD2314C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*","matchCriteriaId":"623BF701-ADC9-4F24-93C5-043A6A7FEF5F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*","matchCriteriaId":"E5311FBE-12BF-41AC-B8C6-D86007834863"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*","matchCriteriaId":"52FB055E-72F9-4CB7-A51D-BF096BD1A55D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*","matchCriteriaId":"57D4F634-03D5-4D9F-901C-7E9CE45F2F38"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*","matchCriteriaId":"4463A1D1-E169-4F0B-91B2-FA126BB444CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*","matchCriteriaId":"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*","matchCriteriaId":"CDD58C58-1B0C-4A71-8C02-F555CEF9C253"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*","matchCriteriaId":"96852D16-AF50-4C70-B125-D2349E6765D7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*","matchCriteriaId":"A15B882A-BA60-4932-A55E-F4A798B30EEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*","matchCriteriaId":"5C9C585C-A6EC-4385-B915-046C110BF95F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/107591","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/107591","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}