Executive Summary

Informations
NameCVE-2019-1851First vendor Publication2019-05-15
VendorCveLast vendor Modification2019-05-21

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:N/I:P/A:N)
Cvss Base Score4Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the External RESTful Services (ERS) API of the Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to generate arbitrary certificates signed by the Internal Certificate Authority (CA) Services on ISE. This vulnerability is due to an incorrect implementation of role-based access control (RBAC). An attacker could exploit this vulnerability by crafting a specific HTTP request with administrative credentials. A successful exploit could allow the attacker to generate a certificate that is signed and trusted by the ISE CA with arbitrary attributes. The attacker could use this certificate to access other networks or assets that are protected by certificate authentication.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1851

CWE : Common Weakness Enumeration

%idName
100 %CWE-285Improper Access Control (Authorization)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application3

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/108356
CISCO https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s...

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-05-21 21:19:32
  • Multiple Updates
2019-05-17 17:19:37
  • Multiple Updates
2019-05-16 09:19:17
  • First insertion