A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.
History

Wed, 20 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-09-25T20:05:22.034297Z

Updated: 2024-11-20T17:10:26.912Z

Reserved: 2019-06-04T00:00:00

Link: CVE-2019-12648

cve-icon Vulnrichment

Updated: 2024-08-04T23:24:39.223Z

cve-icon NVD

Status : Modified

Published: 2019-09-25T20:15:10.477

Modified: 2024-11-21T04:23:15.463

Link: CVE-2019-12648

cve-icon Redhat

No data.