Metrics
- CVSS v4.0 N/A
- CVSS v3.1 6.7 Medium
- CVSS v3.0 6.7 Medium
- CVSS v2 7.2 High
- KEV no
- EPSS 0.00026
- SSVC yes
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00026.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst 3850-12s-e
Subscribe
Catalyst 3850-12s-s
Subscribe
Catalyst 3850-12xs-e
Subscribe
Catalyst 3850-12xs-s
Subscribe
Catalyst 3850-16xs-e
Subscribe
Catalyst 3850-16xs-s
Subscribe
Catalyst 3850-24p-e
Subscribe
Catalyst 3850-24p-l
Subscribe
Catalyst 3850-24p-s
Subscribe
Catalyst 3850-24pw-s
Subscribe
Catalyst 3850-24s-e
Subscribe
Catalyst 3850-24s-s
Subscribe
Catalyst 3850-24t-e
Subscribe
Catalyst 3850-24t-l
Subscribe
Catalyst 3850-24t-s
Subscribe
Catalyst 3850-24u-e
Subscribe
Catalyst 3850-24u-l
Subscribe
Catalyst 3850-24u-s
Subscribe
Catalyst 3850-24xs-e
Subscribe
Catalyst 3850-24xs-s
Subscribe
Catalyst 3850-24xu-e
Subscribe
Catalyst 3850-24xu-l
Subscribe
Catalyst 3850-24xu-s
Subscribe
Catalyst 3850-32xs-e
Subscribe
Catalyst 3850-32xs-s
Subscribe
Catalyst 3850-48f-e
Subscribe
Catalyst 3850-48f-l
Subscribe
Catalyst 3850-48f-s
Subscribe
Catalyst 3850-48p-e
Subscribe
Catalyst 3850-48p-l
Subscribe
Catalyst 3850-48p-s
Subscribe
Catalyst 3850-48pw-s
Subscribe
Catalyst 3850-48t-e
Subscribe
Catalyst 3850-48t-l
Subscribe
Catalyst 3850-48t-s
Subscribe
Catalyst 3850-48u-e
Subscribe
Catalyst 3850-48u-l
Subscribe
Catalyst 3850-48u-s
Subscribe
Catalyst 3850-48xs-e
Subscribe
Catalyst 3850-48xs-f-e
Subscribe
Catalyst 3850-48xs-f-s
Subscribe
Catalyst 3850-48xs-s
Subscribe
Catalyst 9300
Subscribe
Catalyst 9300-24p-a
Subscribe
Catalyst 9300-24p-e
Subscribe
Catalyst 9300-24s-a
Subscribe
Catalyst 9300-24s-e
Subscribe
Catalyst 9300-24t-a
Subscribe
Catalyst 9300-24t-e
Subscribe
Catalyst 9300-24u-a
Subscribe
Catalyst 9300-24u-e
Subscribe
Catalyst 9300-24ux-a
Subscribe
Catalyst 9300-24ux-e
Subscribe
Catalyst 9300-48p-a
Subscribe
Catalyst 9300-48p-e
Subscribe
Catalyst 9300-48s-a
Subscribe
Catalyst 9300-48s-e
Subscribe
Catalyst 9300-48t-a
Subscribe
Catalyst 9300-48t-e
Subscribe
Catalyst 9300-48u-a
Subscribe
Catalyst 9300-48u-e
Subscribe
Catalyst 9300-48un-a
Subscribe
Catalyst 9300-48un-e
Subscribe
Catalyst 9300-48uxm-a
Subscribe
Catalyst 9300-48uxm-e
Subscribe
Catalyst 9300l
Subscribe
Catalyst 9300l-24p-4g-a
Subscribe
Catalyst 9300l-24p-4g-e
Subscribe
Catalyst 9300l-24p-4x-a
Subscribe
Catalyst 9300l-24p-4x-e
Subscribe
Catalyst 9300l-24t-4g-a
Subscribe
Catalyst 9300l-24t-4g-e
Subscribe
Catalyst 9300l-24t-4x-a
Subscribe
Catalyst 9300l-24t-4x-e
Subscribe
Catalyst 9300l-48p-4g-a
Subscribe
Catalyst 9300l-48p-4g-e
Subscribe
Catalyst 9300l-48p-4x-a
Subscribe
Catalyst 9300l-48p-4x-e
Subscribe
Catalyst 9300l-48t-4g-a
Subscribe
Catalyst 9300l-48t-4g-e
Subscribe
Catalyst 9300l-48t-4x-a
Subscribe
Catalyst 9300l-48t-4x-e
Subscribe
Catalyst C3850-12x48u-e
Subscribe
Catalyst C3850-12x48u-l
Subscribe
Catalyst C3850-12x48u-s
Subscribe
Ios
Subscribe
Ios Xe
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-4240 | A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability exists because, under certain circumstances, an affected device can be configured to not verify the digital signatures of system image files during the boot process. An attacker could exploit this vulnerability by abusing a specific feature that is part of the device boot process. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-20T17:10:35.418Z
Reserved: 2019-06-04T00:00:00
Link: CVE-2019-12649
Updated: 2024-08-04T23:24:39.199Z
Status : Modified
Published: 2019-09-25T20:15:10.557
Modified: 2024-11-21T04:23:15.607
Link: CVE-2019-12649
No data.
OpenCVE Enrichment
No data.
EUVD