{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T22:51:32.259","vulnerabilities":[{"cve":{"id":"CVE-2019-1755","sourceIdentifier":"psirt@cisco.com","published":"2019-03-28T01:29:00.330","lastModified":"2024-11-21T04:37:17.687","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Web Services Management Agent (WSMA) function of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary Cisco IOS commands as a privilege level 15 user. The vulnerability occurs because the affected software improperly sanitizes user-supplied input. An attacker could exploit this vulnerability by submitting crafted HTTP requests to the targeted application. A successful exploit could allow the attacker to execute arbitrary commands on the affected device."},{"lang":"es","value":"Una vulnerabilidad en la función WSMA (Web Services Management Agent) del software Cisco IOS XE podría permitir que un atacante remoto autenticado ejecute comandos arbitrarios de Cisco IOS como usuario con nivel 15 de privilegios. La vulnerabilidad ocurre debido a que el software afectado sanea incorrectamente las entradas proporcionadas por el usuario. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones HTTP manipuladas a la aplicación objetivo. Un exploit con éxito podría permitir que el atacante ejecute comandos arbitrarios en el dispositivo afectado."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*","matchCriteriaId":"52BC2A87-31EC-4E15-86E3-ECBEFA9E479A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*","matchCriteriaId":"D92991EE-BB4A-499D-8F14-F7D0E32BE31E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*","matchCriteriaId":"0ED5527C-A638-4E20-9928-099E32E17743"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*","matchCriteriaId":"1A685A9A-235D-4D74-9D6C-AC49E75709CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*","matchCriteriaId":"43052998-0A27-4E83-A884-A94701A3F4CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*","matchCriteriaId":"89526731-B712-43D3-B451-D7FC503D2D65"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*","matchCriteriaId":"302933FE-4B6A-48A3-97F0-4B943251B717"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*","matchCriteriaId":"296636F1-9242-429B-8472-90352C056106"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*","matchCriteriaId":"77993343-0394-413F-ABF9-C1215E9AD800"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*","matchCriteriaId":"283971DD-DD58-4A76-AC2A-F316534ED416"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*","matchCriteriaId":"A8F324A5-4830-482E-A684-AB3B6594CEAE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*","matchCriteriaId":"E8120196-8648-49D0-8262-CD4C9C90C37A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*","matchCriteriaId":"33E7CCE2-C685-4019-9B55-B3BECB3E5F76"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*","matchCriteriaId":"0699DD6E-BA74-4814-93AB-300329C9D032"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*","matchCriteriaId":"C2E2D781-2684-45F1-AC52-636572A0DCA8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*","matchCriteriaId":"479FB47B-AF2E-4FCB-8DE0-400BF325666C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*","matchCriteriaId":"DF2B4C78-5C31-4F3D-9639-305E15576E79"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*","matchCriteriaId":"77E8AF15-AB46-4EAB-8872-8C55E8601599"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*","matchCriteriaId":"957318BE-55D4-4585-AA52-C813301D01C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*","matchCriteriaId":"8F11B703-8A0F-47ED-AA70-951FF78B94A4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*","matchCriteriaId":"FE7B2557-821D-4E05-B5C3-67192573D97D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*","matchCriteriaId":"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*","matchCriteriaId":"187F699A-AF2F-42B0-B855-27413140C384"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*","matchCriteriaId":"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*","matchCriteriaId":"62EDEC28-661E-42EF-88F0-F62D0220D2E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*","matchCriteriaId":"F821EBD7-91E2-4460-BFAF-18482CF6CB8C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*","matchCriteriaId":"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*","matchCriteriaId":"C9B825E6-5929-4890-BDBA-4CF4BD2314C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*","matchCriteriaId":"623BF701-ADC9-4F24-93C5-043A6A7FEF5F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*","matchCriteriaId":"E5311FBE-12BF-41AC-B8C6-D86007834863"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*","matchCriteriaId":"52FB055E-72F9-4CB7-A51D-BF096BD1A55D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*","matchCriteriaId":"57D4F634-03D5-4D9F-901C-7E9CE45F2F38"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*","matchCriteriaId":"4463A1D1-E169-4F0B-91B2-FA126BB444CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*","matchCriteriaId":"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*","matchCriteriaId":"CDD58C58-1B0C-4A71-8C02-F555CEF9C253"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*","matchCriteriaId":"96852D16-AF50-4C70-B125-D2349E6765D7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*","matchCriteriaId":"A15B882A-BA60-4932-A55E-F4A798B30EEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*","matchCriteriaId":"5C9C585C-A6EC-4385-B915-046C110BF95F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/107380","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinj","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/107380","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinj","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}