{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T06:17:40.404","vulnerabilities":[{"cve":{"id":"CVE-2019-1966","sourceIdentifier":"psirt@cisco.com","published":"2019-08-30T09:15:20.193","lastModified":"2024-11-21T04:37:47.227","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in a specific CLI command within the local management (local-mgmt) context for Cisco UCS Fabric Interconnect Software could allow an authenticated, local attacker to gain elevated privileges as the root user on an affected device. The vulnerability is due to extraneous subcommand options present for a specific CLI command within the local-mgmt context. An attacker could exploit this vulnerability by authenticating to an affected device, entering the local-mgmt context, and issuing a specific CLI command and submitting user input. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid user credentials for the device."},{"lang":"es","value":"Una vulnerabilidad en un comando de la CLI específico dentro del contexto de administración local (local-mgmt) para Cisco UCS Fabric Interconnect Software, podría permitir a un atacante autenticado local, alcanzar privilegios elevados como el usuario root en un dispositivo afectado. La vulnerabilidad es debido a opciones de subcomando extrañas presentes para un comando de la CLI específico dentro del contexto local-mgmt. Un atacante podría explotar esta vulnerabilidad identificandose en un dispositivo afectado, ingresando al contexto local-mgmt y emitiendo un comando de la CLI específico y enviando una entrada de usuario. Un explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios del sistema operativo como root en un dispositivo afectado. El atacante necesitaría tener credenciales de usuario válidas para el dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2","matchCriteriaId":"D892E2BF-FF92-45EC-8516-5EA26196B5F3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B488F6-FCDA-4A2A-9692-AC6568120833"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6248_up_fabric_interconnect:-:*:*:*:*:*:*:*","matchCriteriaId":"D96AB2BB-4F4A-44C3-918F-DDB31B0D1FFD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6296_up_fabric_interconnect:-:*:*:*:*:*:*:*","matchCriteriaId":"82775AC1-173D-4335-B13A-6CF73C9C11D8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6324_fabric_interconnect:-:*:*:*:*:*:*:*","matchCriteriaId":"104AB7AA-2AB6-40AB-9BCA-2041396060B1"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6332-16up_fabric_interconnect:-:*:*:*:*:*:*:*","matchCriteriaId":"AEAF3163-4FF6-4BB0-8870-80D3F3F2953B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6332_fabric_interconnect:-:*:*:*:*:*:*:*","matchCriteriaId":"0CB5291D-D248-4125-9129-BC655F082AD8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6454_fabric_interconnect:-:*:*:*:*:*:*:*","matchCriteriaId":"AD8C7CDC-7FA9-4C8C-BC58-2447F67DFC68"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_computing_system:3.2\\(3b\\)a:*:*:*:*:*:*:*","matchCriteriaId":"FD3E0150-7CAD-4276-9AB2-6FA53674FB5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_computing_system:4.0\\(1a\\)a:*:*:*:*:*:*:*","matchCriteriaId":"67F9573E-A988-43F7-9C8D-C1F39C07BA1B"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-ucs-privescalation","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-ucs-privescalation","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}