A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability exists because, under certain circumstances, an affected device can be configured to not verify the digital signatures of system image files during the boot process. An attacker could exploit this vulnerability by abusing a specific feature that is part of the device boot process. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst 3850-12s-e
Subscribe
Catalyst 3850-12s-s
Subscribe
Catalyst 3850-12xs-e
Subscribe
Catalyst 3850-12xs-s
Subscribe
Catalyst 3850-16xs-e
Subscribe
Catalyst 3850-16xs-s
Subscribe
Catalyst 3850-24p-e
Subscribe
Catalyst 3850-24p-l
Subscribe
Catalyst 3850-24p-s
Subscribe
Catalyst 3850-24pw-s
Subscribe
Catalyst 3850-24s-e
Subscribe
Catalyst 3850-24s-s
Subscribe
Catalyst 3850-24t-e
Subscribe
Catalyst 3850-24t-l
Subscribe
Catalyst 3850-24t-s
Subscribe
Catalyst 3850-24u-e
Subscribe
Catalyst 3850-24u-l
Subscribe
Catalyst 3850-24u-s
Subscribe
Catalyst 3850-24xs-e
Subscribe
Catalyst 3850-24xs-s
Subscribe
Catalyst 3850-24xu-e
Subscribe
Catalyst 3850-24xu-l
Subscribe
Catalyst 3850-24xu-s
Subscribe
Catalyst 3850-32xs-e
Subscribe
Catalyst 3850-32xs-s
Subscribe
Catalyst 3850-48f-e
Subscribe
Catalyst 3850-48f-l
Subscribe
Catalyst 3850-48f-s
Subscribe
Catalyst 3850-48p-e
Subscribe
Catalyst 3850-48p-l
Subscribe
Catalyst 3850-48p-s
Subscribe
Catalyst 3850-48pw-s
Subscribe
Catalyst 3850-48t-e
Subscribe
Catalyst 3850-48t-l
Subscribe
Catalyst 3850-48t-s
Subscribe
Catalyst 3850-48u-e
Subscribe
Catalyst 3850-48u-l
Subscribe
Catalyst 3850-48u-s
Subscribe
Catalyst 3850-48xs-e
Subscribe
Catalyst 3850-48xs-f-e
Subscribe
Catalyst 3850-48xs-f-s
Subscribe
Catalyst 3850-48xs-s
Subscribe
Catalyst 9300
Subscribe
Catalyst 9300-24p-a
Subscribe
Catalyst 9300-24p-e
Subscribe
Catalyst 9300-24s-a
Subscribe
Catalyst 9300-24s-e
Subscribe
Catalyst 9300-24t-a
Subscribe
Catalyst 9300-24t-e
Subscribe
Catalyst 9300-24u-a
Subscribe
Catalyst 9300-24u-e
Subscribe
Catalyst 9300-24ux-a
Subscribe
Catalyst 9300-24ux-e
Subscribe
Catalyst 9300-48p-a
Subscribe
Catalyst 9300-48p-e
Subscribe
Catalyst 9300-48s-a
Subscribe
Catalyst 9300-48s-e
Subscribe
Catalyst 9300-48t-a
Subscribe
Catalyst 9300-48t-e
Subscribe
Catalyst 9300-48u-a
Subscribe
Catalyst 9300-48u-e
Subscribe
Catalyst 9300-48un-a
Subscribe
Catalyst 9300-48un-e
Subscribe
Catalyst 9300-48uxm-a
Subscribe
Catalyst 9300-48uxm-e
Subscribe
Catalyst 9300l
Subscribe
Catalyst 9300l-24p-4g-a
Subscribe
Catalyst 9300l-24p-4g-e
Subscribe
Catalyst 9300l-24p-4x-a
Subscribe
Catalyst 9300l-24p-4x-e
Subscribe
Catalyst 9300l-24t-4g-a
Subscribe
Catalyst 9300l-24t-4g-e
Subscribe
Catalyst 9300l-24t-4x-a
Subscribe
Catalyst 9300l-24t-4x-e
Subscribe
Catalyst 9300l-48p-4g-a
Subscribe
Catalyst 9300l-48p-4g-e
Subscribe
Catalyst 9300l-48p-4x-a
Subscribe
Catalyst 9300l-48p-4x-e
Subscribe
Catalyst 9300l-48t-4g-a
Subscribe
Catalyst 9300l-48t-4g-e
Subscribe
Catalyst 9300l-48t-4x-a
Subscribe
Catalyst 9300l-48t-4x-e
Subscribe
Catalyst C3850-12x48u-e
Subscribe
Catalyst C3850-12x48u-l
Subscribe
Catalyst C3850-12x48u-s
Subscribe
Ios
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-4240 | A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability exists because, under certain circumstances, an affected device can be configured to not verify the digital signatures of system image files during the boot process. An attacker could exploit this vulnerability by abusing a specific feature that is part of the device boot process. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 20 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-20T17:10:35.418Z
Reserved: 2019-06-04T00:00:00
Link: CVE-2019-12649
Updated: 2024-08-04T23:24:39.199Z
Status : Modified
Published: 2019-09-25T20:15:10.557
Modified: 2024-11-21T04:23:15.607
Link: CVE-2019-12649
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD