Description
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
Published: 2019-05-13
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-10206 A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0028}

epss

{'score': 0.00281}


Wed, 20 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco 1120 Connected Grid Router 1240 Connected Grid Router 15454-m-wse-k9 15454-m-wse-k9 Firmware 4221 Integrated Services Router 4321 Integrated Services Router 4331 Integrated Services Router 4351 Integrated Services Router 4431 Integrated Services Router 44461 Integrated Services Router 4451-x Integrated Services Router 809 Industrial Integrated Services Routers 829 Industrial Integrated Services Routers A900-rsp2a-128 A900-rsp2a-64 A900-rsp3c-200 A900-rsp3c-400\/w A99-16x100ge-x-se A99-32x100ge-cm A99-32x100ge-tr A99-rp3-se A99-rp3-tr A9k-16x100ge-cm A9k-16x100ge-tr A9k-rsp5-se A9k-rsp5-tr Analog Voice Network Interface Modules Firmware Asa 5500 Firmware Asa 5506-x Asa 5506h-x Asa 5506w-x Asa 5508-x Asa 5516-x Asr-920-10sz-pd Asr-920-12cz-a Asr-920-12cz-d Asr-920-12sz-a Asr-920-12sz-d Asr-920-12sz-im-cc Asr-920-24sz-m Asr-920-24tz-im Asr-920-24tz-m Asr-920-4sz-a Asr-920-4sz-d Asr1000-2t\+20x1ge Asr1000-6tge Asr1000-esp200 Asr1000-mip100 Asr1000-rp3 Asr 1000-esp100 Asr 1000 Series Asr 1000 Series Firmware Asr 1001-hx Asr 1001-x Asr 1001 Firmware Asr 1002-hx C6800-16p10g-xl C6800-32p10g-xl C6800-8p10g-xl C6800-8p40g-xl C6800-sup6t-xl C6816-x-le C6824-x-le-40g C6832-x-le C6840-x-le-40g C9300-24p C9300-24t C9300-24u C9300-24ux C9300-48p C9300-48t C9300-48u C9300-48un C9300-48uxm C9500-12q C9500-16x C9500-24q C9500-24y4c C9500-32c C9500-32qc C9500-40x C9500-48y4c Catalyst 9600 Supervisor Engine-1 Catalyst 9800-40 Wireless Controller Catalyst 9800-40 Wireless Controller Firmware Catalyst 9800-80 Wireless Controller Catalyst 9800-80 Wireless Controller Firmware Cbr-8 Converged Broadband Router Cbr-ccap-lc-40g-r Cbr-lc-8d31-16u31 Ds-x9334-k9 Ds-x9648-1536k9 Encs 5100 Encs 5100 Firmware Encs 5400 Encs 5400 Firmware Firepower 2100 Firmware Firepower 2110 Firepower 2120 Firepower 2130 Firepower 2140 Firepower 4000 Firmware Firepower 4110 Firepower 4120 Firepower 4140 Firepower 4150 Firepower 9000 Firmware Firepower 9300 Ic3000-k9 Ic3000-k9 Firmware Industrial Security Appliances 3000 Industrial Security Appliances 3000 Firmware Integrated Services Router 4200 Firmware Integrated Services Router 4300 Firmware Integrated Services Router 4400 Firmware Integrated Services Router T1\/e1 Voice And Wan Network Interface Modules Firmware Ios Ios Xe Ios Xr N3k-c31108pc-v N3k-c31108tc-v N3k-c3132c-z N3k-c3264c-e N77-m312cq-26l N77-m348xp-23l N77-sup3e N7k-m324fq-25l N7k-m348xp-25l N9k-c92300yc N9k-c93108tc-ex N9k-c93108tc-fx N9k-c93180lc-ex N9k-c93180yc-ex N9k-c93180yc-fx N9k-c93240yc-fx2 N9k-c9348gc-fxp N9k-sup-a\+ N9k-sup-b\+ Nc55-24h12f-se Nc55-36x100g-a-se Nc55-36x100g-s Nc55-5504-fc Nc55-5516-fc Nc55-6x200-dwdm-s Nc55-mod-a-s Ncs-5501 Ncs-5501-se Ncs-5502 Ncs-5502-se Ncs-55a1-24h Ncs-55a1-36h-s Ncs-55a1-36h-se Ncs-55a2-mod-hd-s Ncs-55a2-mod-hx-s Ncs-55a2-mod-s Ncs-55a2-mod-se-h-s Ncs-55a2-mod-se-s Ncs2k-mr-mxp-k9 Ncs2k-mr-mxp-k9 Firmware Network Convergence System 1002 Network Convergence System 5001 Network Convergence System 5002 Nim-1ce1t1-pri Nim-1ge-cu-sfp Nim-1mft-t1\/e1 Nim-2bri-nt\/te Nim-2ce1t1-pri Nim-2fox Nim-2fxs Nim-2fxs\/4fxo Nim-2fxs\/4fxop Nim-2fxsp Nim-2ge-cu-sfp Nim-2mft-t1\/e1 Nim-4bri-nt\/te Nim-4e\/m Nim-4fxo Nim-4fxs Nim-4fxsp Nim-4mft-t1\/e1 Nim-8ce1t1-pri Nim-8mft-t1\/e1 Nx-os Ons 15454 Mstp Ons 15454 Mstp Firmware Sm-x-1t3\/e3 Sm-x-1t3\/e3 Firmware Sm-x-pvdm-1000 Sm-x-pvdm-2000 Sm-x-pvdm-3000 Sm-x-pvdm-500 Supervisor A\+ Firmware Supervisor B\+ Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-20T17:23:01.830Z

Reserved: 2018-12-06T00:00:00.000Z

Link: CVE-2019-1649

cve-icon Vulnrichment

Updated: 2024-08-04T18:20:28.350Z

cve-icon NVD

Status : Modified

Published: 2019-05-13T19:29:01.520

Modified: 2024-11-21T04:37:00.627

Link: CVE-2019-1649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses