A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.

Project Subscriptions

Vendors Products
1120 Connected Grid Router Subscribe
1240 Connected Grid Router Subscribe
15454-m-wse-k9 Subscribe
15454-m-wse-k9 Firmware Subscribe
4221 Integrated Services Router Subscribe
4321 Integrated Services Router Subscribe
4331 Integrated Services Router Subscribe
4351 Integrated Services Router Subscribe
4431 Integrated Services Router Subscribe
44461 Integrated Services Router Subscribe
4451-x Integrated Services Router Subscribe
809 Industrial Integrated Services Routers Subscribe
829 Industrial Integrated Services Routers Subscribe
A900-rsp2a-128 Subscribe
A900-rsp2a-64 Subscribe
A900-rsp3c-200 Subscribe
A900-rsp3c-400\/w Subscribe
A99-16x100ge-x-se Subscribe
A99-32x100ge-cm Subscribe
A99-32x100ge-tr Subscribe
A99-rp3-se Subscribe
A99-rp3-tr Subscribe
A9k-16x100ge-cm Subscribe
A9k-16x100ge-tr Subscribe
A9k-rsp5-se Subscribe
A9k-rsp5-tr Subscribe
Analog Voice Network Interface Modules Firmware Subscribe
Asa 5500 Firmware Subscribe
Asa 5506-x Subscribe
Asa 5506h-x Subscribe
Asa 5506w-x Subscribe
Asa 5508-x Subscribe
Asa 5516-x Subscribe
Asr-920-10sz-pd Subscribe
Asr-920-12cz-a Subscribe
Asr-920-12cz-d Subscribe
Asr-920-12sz-a Subscribe
Asr-920-12sz-d Subscribe
Asr-920-12sz-im-cc Subscribe
Asr-920-24sz-m Subscribe
Asr-920-24tz-im Subscribe
Asr-920-24tz-m Subscribe
Asr-920-4sz-a Subscribe
Asr-920-4sz-d Subscribe
Asr1000-2t\+20x1ge Subscribe
Asr1000-6tge Subscribe
Asr1000-esp200 Subscribe
Asr1000-mip100 Subscribe
Asr1000-rp3 Subscribe
Asr 1000-esp100 Subscribe
Asr 1000 Series Subscribe
Asr 1000 Series Firmware Subscribe
Asr 1001-hx Subscribe
Asr 1001-x Subscribe
Asr 1001 Firmware Subscribe
Asr 1002-hx Subscribe
C6800-16p10g-xl Subscribe
C6800-32p10g-xl Subscribe
C6800-8p10g-xl Subscribe
C6800-8p40g-xl Subscribe
C6800-sup6t-xl Subscribe
C6816-x-le Subscribe
C6824-x-le-40g Subscribe
C6832-x-le Subscribe
C6840-x-le-40g Subscribe
C9300-24p Subscribe
C9300-24t Subscribe
C9300-24u Subscribe
C9300-24ux Subscribe
C9300-48p Subscribe
C9300-48t Subscribe
C9300-48u Subscribe
C9300-48un Subscribe
C9300-48uxm Subscribe
C9500-12q Subscribe
C9500-16x Subscribe
C9500-24q Subscribe
C9500-24y4c Subscribe
C9500-32c Subscribe
C9500-32qc Subscribe
C9500-40x Subscribe
C9500-48y4c Subscribe
Catalyst 9600 Supervisor Engine-1 Subscribe
Catalyst 9800-40 Wireless Controller Subscribe
Catalyst 9800-40 Wireless Controller Firmware Subscribe
Catalyst 9800-80 Wireless Controller Subscribe
Catalyst 9800-80 Wireless Controller Firmware Subscribe
Cbr-8 Converged Broadband Router Subscribe
Cbr-ccap-lc-40g-r Subscribe
Cbr-lc-8d31-16u31 Subscribe
Ds-x9334-k9 Subscribe
Ds-x9648-1536k9 Subscribe
Encs 5100 Subscribe
Encs 5100 Firmware Subscribe
Encs 5400 Subscribe
Encs 5400 Firmware Subscribe
Firepower 2100 Firmware Subscribe
Firepower 2110 Subscribe
Firepower 2120 Subscribe
Firepower 2130 Subscribe
Firepower 2140 Subscribe
Firepower 4000 Firmware Subscribe
Firepower 4110 Subscribe
Firepower 4120 Subscribe
Firepower 4140 Subscribe
Firepower 4150 Subscribe
Firepower 9000 Firmware Subscribe
Firepower 9300 Subscribe
Ic3000-k9 Subscribe
Ic3000-k9 Firmware Subscribe
Industrial Security Appliances 3000 Subscribe
Industrial Security Appliances 3000 Firmware Subscribe
Integrated Services Router 4200 Firmware Subscribe
Integrated Services Router 4300 Firmware Subscribe
Integrated Services Router 4400 Firmware Subscribe
Integrated Services Router T1\/e1 Voice And Wan Network Interface Modules Firmware Subscribe
N3k-c31108pc-v Subscribe
N3k-c31108tc-v Subscribe
N3k-c3132c-z Subscribe
N3k-c3264c-e Subscribe
N77-m312cq-26l Subscribe
N77-m348xp-23l Subscribe
N77-sup3e Subscribe
N7k-m324fq-25l Subscribe
N7k-m348xp-25l Subscribe
N9k-c92300yc Subscribe
N9k-c93108tc-ex Subscribe
N9k-c93108tc-fx Subscribe
N9k-c93180lc-ex Subscribe
N9k-c93180yc-ex Subscribe
N9k-c93180yc-fx Subscribe
N9k-c93240yc-fx2 Subscribe
N9k-c9348gc-fxp Subscribe
N9k-sup-a\+ Subscribe
N9k-sup-b\+ Subscribe
Nc55-24h12f-se Subscribe
Nc55-36x100g-a-se Subscribe
Nc55-36x100g-s Subscribe
Nc55-5504-fc Subscribe
Nc55-5516-fc Subscribe
Nc55-6x200-dwdm-s Subscribe
Nc55-mod-a-s Subscribe
Ncs-5501 Subscribe
Ncs-5501-se Subscribe
Ncs-5502 Subscribe
Ncs-5502-se Subscribe
Ncs-55a1-24h Subscribe
Ncs-55a1-36h-s Subscribe
Ncs-55a1-36h-se Subscribe
Ncs-55a2-mod-hd-s Subscribe
Ncs-55a2-mod-hx-s Subscribe
Ncs-55a2-mod-s Subscribe
Ncs-55a2-mod-se-h-s Subscribe
Ncs-55a2-mod-se-s Subscribe
Ncs2k-mr-mxp-k9 Subscribe
Ncs2k-mr-mxp-k9 Firmware Subscribe
Network Convergence System 1002 Subscribe
Network Convergence System 5001 Subscribe
Network Convergence System 5002 Subscribe
Nim-1ce1t1-pri Subscribe
Nim-1ge-cu-sfp Subscribe
Nim-1mft-t1\/e1 Subscribe
Nim-2bri-nt\/te Subscribe
Nim-2ce1t1-pri Subscribe
Nim-2fox Subscribe
Nim-2fxs Subscribe
Nim-2fxs\/4fxo Subscribe
Nim-2fxs\/4fxop Subscribe
Nim-2fxsp Subscribe
Nim-2ge-cu-sfp Subscribe
Nim-2mft-t1\/e1 Subscribe
Nim-4bri-nt\/te Subscribe
Nim-4e\/m Subscribe
Nim-4fxo Subscribe
Nim-4fxs Subscribe
Nim-4fxsp Subscribe
Nim-4mft-t1\/e1 Subscribe
Nim-8ce1t1-pri Subscribe
Nim-8mft-t1\/e1 Subscribe
Ons 15454 Mstp Subscribe
Ons 15454 Mstp Firmware Subscribe
Sm-x-1t3\/e3 Subscribe
Sm-x-1t3\/e3 Firmware Subscribe
Sm-x-pvdm-1000 Subscribe
Sm-x-pvdm-2000 Subscribe
Sm-x-pvdm-3000 Subscribe
Sm-x-pvdm-500 Subscribe
Supervisor A\+ Firmware Subscribe
Supervisor B\+ Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10206 A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0028}

epss

{'score': 0.00281}


Wed, 20 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-20T17:23:01.830Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1649

cve-icon Vulnrichment

Updated: 2024-08-04T18:20:28.350Z

cve-icon NVD

Status : Modified

Published: 2019-05-13T19:29:01.520

Modified: 2024-11-21T04:37:00.627

Link: CVE-2019-1649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses