{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T09:47:47.777","vulnerabilities":[{"cve":{"id":"CVE-2019-1950","sourceIdentifier":"psirt@cisco.com","published":"2020-02-19T20:15:14.410","lastModified":"2024-11-21T04:37:45.133","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, local attacker to gain unauthorized access to an affected device. The vulnerability is due to the existence of default credentials within the default configuration of an affected device. An attacker who has access to an affected device could log in with elevated privileges. A successful exploit could allow the attacker to take complete control of the device. This vulnerability affects Cisco devices that are running Cisco IOS XE SD-WAN Software releases 16.11 and earlier."},{"lang":"es","value":"Una vulnerabilidad en el firmware de los Cisco UCS C-Series Rack Servers, podría permitir a un atacante físico autenticado omitir las verificaciones de comprobación de Unified Extensible Firmware Interface (UEFI) Secure Boot y cargar una imagen de software comprometida en un dispositivo afectado. La vulnerabilidad es debido a una comprobación inapropiada de las imágenes de actualización del firmware del servidor. Un atacante podría explotar esta vulnerabilidad mediante la instalación de una versión de firmware del servidor que le permitiría desactivar UEFI Secure Boot. Una explotación con éxito podría permitir al atacante omitir las verificaciones de comprobación de firma que realiza la tecnología UEFI Secure Boot y cargar una imagen de software comprometida sobre el dispositivo afectado. Una imagen de software comprometida es cualquier imagen de software que no haya sido firmada digitalmente por Cisco."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-255"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1188"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*","versionEndIncluding":"16.11","matchCriteriaId":"C7D3AD3F-F4FD-432F-8BB1-5EEBE0602D2C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A2D2305B-B69E-4F74-A44E-07B3205CE9F7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5AAD4397-6DCF-493A-BD61-3A890F6F3AB2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"BB9229F3-7BCE-46C4-9879-D57B5BAAE44E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"6C8AED7C-DDA3-4C29-BB95-6518C02C551A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5419CB9F-241F-4431-914F-2659BE27BEA5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5720462A-BE6B-4E84-A1A1-01E80BBA86AD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"E8B60888-6E2B-494E-AC65-83337661EE7D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*","matchCriteriaId":"FE2182E7-C813-4966-A36C-E648A9344299"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*","matchCriteriaId":"7594E307-AC80-41EC-AE94-07E664A7D701"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*","matchCriteriaId":"CD2794BD-C8CE-46EF-9857-1723FCF04E46"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*","matchCriteriaId":"444F688F-79D0-4F22-B530-7BD520080B8F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*","matchCriteriaId":"55DD2272-10C2-43B9-9F13-6DC41DBE179B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*","matchCriteriaId":"7428E0A8-1641-47FB-9CA9-34311DEF660D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*","matchCriteriaId":"DE7401B7-094C-46EB-9869-2F0372E8B26B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*","matchCriteriaId":"8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*","matchCriteriaId":"854D9594-FE84-4E7B-BA21-A3287F2DC302"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*","matchCriteriaId":"62081293-8355-4197-A5A8-1E434B808680"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ir1101:-:*:*:*:*:*:*:*","matchCriteriaId":"2E80DC31-8EC9-47A2-B961-0A819374A884"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*","matchCriteriaId":"ABB6E612-4246-4408-B3F6-B31E771F5ACB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*","matchCriteriaId":"91B129B2-2B31-4DE0-9F83-CC6E0C8729A0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*","matchCriteriaId":"3CBD3CD0-B542-4B23-9C9D-061643BE44E8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*","matchCriteriaId":"A22A2647-A4C0-4681-BBC5-D95ADBAA0457"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*","matchCriteriaId":"367C2A49-4C4D-471B-9B34-AFAFA5AE9503"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*","matchCriteriaId":"B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*","matchCriteriaId":"DF77273F-73C0-40EB-BB4E-75269D46F074"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"757958F5-F58C-4128-B128-D989A56ACA34"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"F62D6B73-1AB7-4B93-A92E-275E78DF114C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*","matchCriteriaId":"A0E6AAD9-824C-4126-8347-2FF1895E6D33"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs-e180d-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"BB3E47EB-9C60-4A06-956A-46B5D2E46239"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*","matchCriteriaId":"155D990F-C7DA-48DD-92CC-18542DBBE572"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-cred-EVGSF259","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-cred-EVGSF259","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}