{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T12:04:36.966","vulnerabilities":[{"cve":{"id":"CVE-2019-1982","sourceIdentifier":"psirt@cisco.com","published":"2019-11-05T20:15:11.907","lastModified":"2024-11-26T16:09:02.407","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the HTTP traffic filtering component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper handling of HTTP requests, including those communicated over a secure HTTPS connection, that contain maliciously crafted headers. An attacker could exploit this vulnerability by sending malicious requests to an affected device. An exploit could allow the attacker to bypass filtering and deliver malicious requests to protected systems, allowing attackers to deliver malicious content that would otherwise be blocked."},{"lang":"es","value":"Una vulnerabilidad en el componente de filtrado de tráfico HTTP del software Cisco Firepower Threat Defense, el software Cisco FirePOWER Services para ASA y el software Cisco Firepower Management Center, podría permitir a un atacante remoto no autenticado omitir las protecciones de filtrado. La vulnerabilidad es debido al manejo inapropiado de las peticiones HTTP, incluidas las comunicadas por medio de una conexión HTTPS segura, que contienen encabezados especialmente diseñados con fines maliciosos. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones maliciosas a un dispositivo afectado. Una explotación podría permitir al atacante evitar el filtrado y entregar peticiones maliciosas hacia los sistemas protegidos, lo que permitiría a atacantes entregar contenido malicioso que de otra manera se bloquearía."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-276"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_services_software_for_asa:-:*:*:*:*:*:*:*","matchCriteriaId":"D4C5EF69-498C-4433-8B86-91EB343C3F63"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:-:*:*:*:*:*:*:*","matchCriteriaId":"1E239E86-8CC7-4BE1-BE5F-AF623DB68058"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.13:*:*:*:*:*:*:*","matchCriteriaId":"9A0E77B1-0B0C-47A6-B906-7BBA3CF8C890"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:2.9.14.0:*:*:*:*:*:*:*","matchCriteriaId":"2986D5BD-1936-41BD-A992-7672C019F27E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_firewall_management_center:3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"B0E7A9BD-8C83-401C-BB3E-E52F4B7608A5"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190816-ftd-http","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}