Metrics
- CVSS v4.0 N/A
- CVSS v3.1 6.7 Medium
- CVSS v3.0 6.7 Medium
- CVSS v2 7.2 High
- KEV no
- EPSS 0.00237
- SSVC yes
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00237.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
1120 Connected Grid Router
Subscribe
1240 Connected Grid Router
Subscribe
15454-m-wse-k9
Subscribe
15454-m-wse-k9 Firmware
Subscribe
4221 Integrated Services Router
Subscribe
4321 Integrated Services Router
Subscribe
4331 Integrated Services Router
Subscribe
4351 Integrated Services Router
Subscribe
4431 Integrated Services Router
Subscribe
44461 Integrated Services Router
Subscribe
4451-x Integrated Services Router
Subscribe
809 Industrial Integrated Services Routers
Subscribe
829 Industrial Integrated Services Routers
Subscribe
A900-rsp2a-128
Subscribe
A900-rsp2a-64
Subscribe
A900-rsp3c-200
Subscribe
A900-rsp3c-400\/w
Subscribe
A99-16x100ge-x-se
Subscribe
A99-32x100ge-cm
Subscribe
A99-32x100ge-tr
Subscribe
A99-rp3-se
Subscribe
A99-rp3-tr
Subscribe
A9k-16x100ge-cm
Subscribe
A9k-16x100ge-tr
Subscribe
A9k-rsp5-se
Subscribe
A9k-rsp5-tr
Subscribe
Analog Voice Network Interface Modules Firmware
Subscribe
Asa 5500 Firmware
Subscribe
Asa 5506-x
Subscribe
Asa 5506h-x
Subscribe
Asa 5506w-x
Subscribe
Asa 5508-x
Subscribe
Asa 5516-x
Subscribe
Asr-920-10sz-pd
Subscribe
Asr-920-12cz-a
Subscribe
Asr-920-12cz-d
Subscribe
Asr-920-12sz-a
Subscribe
Asr-920-12sz-d
Subscribe
Asr-920-12sz-im-cc
Subscribe
Asr-920-24sz-m
Subscribe
Asr-920-24tz-im
Subscribe
Asr-920-24tz-m
Subscribe
Asr-920-4sz-a
Subscribe
Asr-920-4sz-d
Subscribe
Asr1000-2t\+20x1ge
Subscribe
Asr1000-6tge
Subscribe
Asr1000-esp200
Subscribe
Asr1000-mip100
Subscribe
Asr1000-rp3
Subscribe
Asr 1000-esp100
Subscribe
Asr 1000 Series
Subscribe
Asr 1000 Series Firmware
Subscribe
Asr 1001-hx
Subscribe
Asr 1001-x
Subscribe
Asr 1001 Firmware
Subscribe
Asr 1002-hx
Subscribe
C6800-16p10g-xl
Subscribe
C6800-32p10g-xl
Subscribe
C6800-8p10g-xl
Subscribe
C6800-8p40g-xl
Subscribe
C6800-sup6t-xl
Subscribe
C6816-x-le
Subscribe
C6824-x-le-40g
Subscribe
C6832-x-le
Subscribe
C6840-x-le-40g
Subscribe
C9300-24p
Subscribe
C9300-24t
Subscribe
C9300-24u
Subscribe
C9300-24ux
Subscribe
C9300-48p
Subscribe
C9300-48t
Subscribe
C9300-48u
Subscribe
C9300-48un
Subscribe
C9300-48uxm
Subscribe
C9500-12q
Subscribe
C9500-16x
Subscribe
C9500-24q
Subscribe
C9500-24y4c
Subscribe
C9500-32c
Subscribe
C9500-32qc
Subscribe
C9500-40x
Subscribe
C9500-48y4c
Subscribe
Catalyst 9600 Supervisor Engine-1
Subscribe
Catalyst 9800-40 Wireless Controller
Subscribe
Catalyst 9800-40 Wireless Controller Firmware
Subscribe
Catalyst 9800-80 Wireless Controller
Subscribe
Catalyst 9800-80 Wireless Controller Firmware
Subscribe
Cbr-8 Converged Broadband Router
Subscribe
Cbr-ccap-lc-40g-r
Subscribe
Cbr-lc-8d31-16u31
Subscribe
Ds-x9334-k9
Subscribe
Ds-x9648-1536k9
Subscribe
Encs 5100
Subscribe
Encs 5100 Firmware
Subscribe
Encs 5400
Subscribe
Encs 5400 Firmware
Subscribe
Firepower 2100 Firmware
Subscribe
Firepower 2110
Subscribe
Firepower 2120
Subscribe
Firepower 2130
Subscribe
Firepower 2140
Subscribe
Firepower 4000 Firmware
Subscribe
Firepower 4110
Subscribe
Firepower 4120
Subscribe
Firepower 4140
Subscribe
Firepower 4150
Subscribe
Firepower 9000 Firmware
Subscribe
Firepower 9300
Subscribe
Ic3000-k9
Subscribe
Ic3000-k9 Firmware
Subscribe
Industrial Security Appliances 3000
Subscribe
Industrial Security Appliances 3000 Firmware
Subscribe
Integrated Services Router 4200 Firmware
Subscribe
Integrated Services Router 4300 Firmware
Subscribe
Integrated Services Router 4400 Firmware
Subscribe
Integrated Services Router T1\/e1 Voice And Wan Network Interface Modules Firmware
Subscribe
Ios
Subscribe
Ios Xe
Subscribe
Ios Xr
Subscribe
N3k-c31108pc-v
Subscribe
N3k-c31108tc-v
Subscribe
N3k-c3132c-z
Subscribe
N3k-c3264c-e
Subscribe
N77-m312cq-26l
Subscribe
N77-m348xp-23l
Subscribe
N77-sup3e
Subscribe
N7k-m324fq-25l
Subscribe
N7k-m348xp-25l
Subscribe
N9k-c92300yc
Subscribe
N9k-c93108tc-ex
Subscribe
N9k-c93108tc-fx
Subscribe
N9k-c93180lc-ex
Subscribe
N9k-c93180yc-ex
Subscribe
N9k-c93180yc-fx
Subscribe
N9k-c93240yc-fx2
Subscribe
N9k-c9348gc-fxp
Subscribe
N9k-sup-a\+
Subscribe
N9k-sup-b\+
Subscribe
Nc55-24h12f-se
Subscribe
Nc55-36x100g-a-se
Subscribe
Nc55-36x100g-s
Subscribe
Nc55-5504-fc
Subscribe
Nc55-5516-fc
Subscribe
Nc55-6x200-dwdm-s
Subscribe
Nc55-mod-a-s
Subscribe
Ncs-5501
Subscribe
Ncs-5501-se
Subscribe
Ncs-5502
Subscribe
Ncs-5502-se
Subscribe
Ncs-55a1-24h
Subscribe
Ncs-55a1-36h-s
Subscribe
Ncs-55a1-36h-se
Subscribe
Ncs-55a2-mod-hd-s
Subscribe
Ncs-55a2-mod-hx-s
Subscribe
Ncs-55a2-mod-s
Subscribe
Ncs-55a2-mod-se-h-s
Subscribe
Ncs-55a2-mod-se-s
Subscribe
Ncs2k-mr-mxp-k9
Subscribe
Ncs2k-mr-mxp-k9 Firmware
Subscribe
Network Convergence System 1002
Subscribe
Network Convergence System 5001
Subscribe
Network Convergence System 5002
Subscribe
Nim-1ce1t1-pri
Subscribe
Nim-1ge-cu-sfp
Subscribe
Nim-1mft-t1\/e1
Subscribe
Nim-2bri-nt\/te
Subscribe
Nim-2ce1t1-pri
Subscribe
Nim-2fox
Subscribe
Nim-2fxs
Subscribe
Nim-2fxs\/4fxo
Subscribe
Nim-2fxs\/4fxop
Subscribe
Nim-2fxsp
Subscribe
Nim-2ge-cu-sfp
Subscribe
Nim-2mft-t1\/e1
Subscribe
Nim-4bri-nt\/te
Subscribe
Nim-4e\/m
Subscribe
Nim-4fxo
Subscribe
Nim-4fxs
Subscribe
Nim-4fxsp
Subscribe
Nim-4mft-t1\/e1
Subscribe
Nim-8ce1t1-pri
Subscribe
Nim-8mft-t1\/e1
Subscribe
Nx-os
Subscribe
Ons 15454 Mstp
Subscribe
Ons 15454 Mstp Firmware
Subscribe
Sm-x-1t3\/e3
Subscribe
Sm-x-1t3\/e3 Firmware
Subscribe
Sm-x-pvdm-1000
Subscribe
Sm-x-pvdm-2000
Subscribe
Sm-x-pvdm-3000
Subscribe
Sm-x-pvdm-500
Subscribe
Supervisor A\+ Firmware
Subscribe
Supervisor B\+ Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10206 | A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 20 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-20T17:23:01.830Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1649
Updated: 2024-08-04T18:20:28.350Z
Status : Modified
Published: 2019-05-13T19:29:01.520
Modified: 2024-11-21T04:37:00.627
Link: CVE-2019-1649
No data.
OpenCVE Enrichment
No data.
EUVD