CVE-2019-1757 (GCVE-0-2019-1757)
Vulnerability from cvelistv5
Published
2019-03-28 00:20
Modified
2024-11-15 15:15
Severity ?
CWE
Summary
A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.
Impacted products
Vendor Product Version
Cisco Cisco IOS and IOS XE Software Version: 3.6.4E
Version: 3.6.5E
Version: 3.6.6E
Version: 3.6.5aE
Version: 3.6.5bE
Version: 3.6.7E
Version: 3.6.8E
Version: 3.6.7aE
Version: 3.6.7bE
Version: 3.7.4E
Version: 3.7.5E
Version: 3.16.1S
Version: 3.16.1aS
Version: 3.16.2S
Version: 3.16.2aS
Version: 3.16.3S
Version: 3.16.2bS
Version: 3.16.3aS
Version: 3.16.4S
Version: 3.16.4aS
Version: 3.16.4bS
Version: 3.16.4gS
Version: 3.16.5S
Version: 3.16.4cS
Version: 3.16.4dS
Version: 3.16.4eS
Version: 3.16.6S
Version: 3.16.5aS
Version: 3.16.5bS
Version: 3.16.7S
Version: 3.16.6bS
Version: 3.16.7aS
Version: 3.16.7bS
Version: 3.17.0S
Version: 3.17.1S
Version: 3.17.2S
Version: 3.17.1aS
Version: 3.17.3S
Version: 3.17.4S
Version: 16.2.1
Version: 16.2.2
Version: 3.8.2E
Version: 3.8.3E
Version: 3.8.4E
Version: 3.8.5E
Version: 3.8.5aE
Version: 3.8.6E
Version: 16.3.1
Version: 16.3.2
Version: 16.3.3
Version: 16.3.1a
Version: 16.3.4
Version: 16.3.5
Version: 16.3.5b
Version: 16.3.6
Version: 16.4.1
Version: 16.4.2
Version: 16.4.3
Version: 16.5.1
Version: 16.5.1a
Version: 16.5.1b
Version: 16.5.2
Version: 16.5.3
Version: 3.18.0aS
Version: 3.18.0S
Version: 3.18.1S
Version: 3.18.2S
Version: 3.18.3S
Version: 3.18.4S
Version: 3.18.0SP
Version: 3.18.1SP
Version: 3.18.1aSP
Version: 3.18.1gSP
Version: 3.18.1bSP
Version: 3.18.1cSP
Version: 3.18.2SP
Version: 3.18.1hSP
Version: 3.18.2aSP
Version: 3.18.1iSP
Version: 3.18.3SP
Version: 3.18.4SP
Version: 3.18.3aSP
Version: 3.18.3bSP
Version: 3.9.0E
Version: 3.9.1E
Version: 3.9.2E
Version: 3.9.2bE
Version: 16.6.1
Version: 16.6.2
Version: 16.6.3
Version: 16.7.1
Version: 16.7.1a
Version: 16.7.1b
Version: 16.7.2
Version: 16.8.1
Version: 16.8.1a
Version: 16.8.1b
Version: 16.8.1s
Version: 16.8.1c
Version: 16.8.1d
Version: 16.8.2
Version: 16.9.1b
Version: 16.9.1s
Version: 16.9.1c
Version: 3.10.0E
Version: 3.10.1E
Version: 3.10.0cE
Version: 3.10.1aE
Version: 3.10.1sE
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.249Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert"
          },
          {
            "name": "107617",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/107617"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1757",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T15:14:56.593514Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T15:15:52.387Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS and IOS XE Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.6.4E"
            },
            {
              "status": "affected",
              "version": "3.6.5E"
            },
            {
              "status": "affected",
              "version": "3.6.6E"
            },
            {
              "status": "affected",
              "version": "3.6.5aE"
            },
            {
              "status": "affected",
              "version": "3.6.5bE"
            },
            {
              "status": "affected",
              "version": "3.6.7E"
            },
            {
              "status": "affected",
              "version": "3.6.8E"
            },
            {
              "status": "affected",
              "version": "3.6.7aE"
            },
            {
              "status": "affected",
              "version": "3.6.7bE"
            },
            {
              "status": "affected",
              "version": "3.7.4E"
            },
            {
              "status": "affected",
              "version": "3.7.5E"
            },
            {
              "status": "affected",
              "version": "3.16.1S"
            },
            {
              "status": "affected",
              "version": "3.16.1aS"
            },
            {
              "status": "affected",
              "version": "3.16.2S"
            },
            {
              "status": "affected",
              "version": "3.16.2aS"
            },
            {
              "status": "affected",
              "version": "3.16.3S"
            },
            {
              "status": "affected",
              "version": "3.16.2bS"
            },
            {
              "status": "affected",
              "version": "3.16.3aS"
            },
            {
              "status": "affected",
              "version": "3.16.4S"
            },
            {
              "status": "affected",
              "version": "3.16.4aS"
            },
            {
              "status": "affected",
              "version": "3.16.4bS"
            },
            {
              "status": "affected",
              "version": "3.16.4gS"
            },
            {
              "status": "affected",
              "version": "3.16.5S"
            },
            {
              "status": "affected",
              "version": "3.16.4cS"
            },
            {
              "status": "affected",
              "version": "3.16.4dS"
            },
            {
              "status": "affected",
              "version": "3.16.4eS"
            },
            {
              "status": "affected",
              "version": "3.16.6S"
            },
            {
              "status": "affected",
              "version": "3.16.5aS"
            },
            {
              "status": "affected",
              "version": "3.16.5bS"
            },
            {
              "status": "affected",
              "version": "3.16.7S"
            },
            {
              "status": "affected",
              "version": "3.16.6bS"
            },
            {
              "status": "affected",
              "version": "3.16.7aS"
            },
            {
              "status": "affected",
              "version": "3.16.7bS"
            },
            {
              "status": "affected",
              "version": "3.17.0S"
            },
            {
              "status": "affected",
              "version": "3.17.1S"
            },
            {
              "status": "affected",
              "version": "3.17.2S"
            },
            {
              "status": "affected",
              "version": "3.17.1aS"
            },
            {
              "status": "affected",
              "version": "3.17.3S"
            },
            {
              "status": "affected",
              "version": "3.17.4S"
            },
            {
              "status": "affected",
              "version": "16.2.1"
            },
            {
              "status": "affected",
              "version": "16.2.2"
            },
            {
              "status": "affected",
              "version": "3.8.2E"
            },
            {
              "status": "affected",
              "version": "3.8.3E"
            },
            {
              "status": "affected",
              "version": "3.8.4E"
            },
            {
              "status": "affected",
              "version": "3.8.5E"
            },
            {
              "status": "affected",
              "version": "3.8.5aE"
            },
            {
              "status": "affected",
              "version": "3.8.6E"
            },
            {
              "status": "affected",
              "version": "16.3.1"
            },
            {
              "status": "affected",
              "version": "16.3.2"
            },
            {
              "status": "affected",
              "version": "16.3.3"
            },
            {
              "status": "affected",
              "version": "16.3.1a"
            },
            {
              "status": "affected",
              "version": "16.3.4"
            },
            {
              "status": "affected",
              "version": "16.3.5"
            },
            {
              "status": "affected",
              "version": "16.3.5b"
            },
            {
              "status": "affected",
              "version": "16.3.6"
            },
            {
              "status": "affected",
              "version": "16.4.1"
            },
            {
              "status": "affected",
              "version": "16.4.2"
            },
            {
              "status": "affected",
              "version": "16.4.3"
            },
            {
              "status": "affected",
              "version": "16.5.1"
            },
            {
              "status": "affected",
              "version": "16.5.1a"
            },
            {
              "status": "affected",
              "version": "16.5.1b"
            },
            {
              "status": "affected",
              "version": "16.5.2"
            },
            {
              "status": "affected",
              "version": "16.5.3"
            },
            {
              "status": "affected",
              "version": "3.18.0aS"
            },
            {
              "status": "affected",
              "version": "3.18.0S"
            },
            {
              "status": "affected",
              "version": "3.18.1S"
            },
            {
              "status": "affected",
              "version": "3.18.2S"
            },
            {
              "status": "affected",
              "version": "3.18.3S"
            },
            {
              "status": "affected",
              "version": "3.18.4S"
            },
            {
              "status": "affected",
              "version": "3.18.0SP"
            },
            {
              "status": "affected",
              "version": "3.18.1SP"
            },
            {
              "status": "affected",
              "version": "3.18.1aSP"
            },
            {
              "status": "affected",
              "version": "3.18.1gSP"
            },
            {
              "status": "affected",
              "version": "3.18.1bSP"
            },
            {
              "status": "affected",
              "version": "3.18.1cSP"
            },
            {
              "status": "affected",
              "version": "3.18.2SP"
            },
            {
              "status": "affected",
              "version": "3.18.1hSP"
            },
            {
              "status": "affected",
              "version": "3.18.2aSP"
            },
            {
              "status": "affected",
              "version": "3.18.1iSP"
            },
            {
              "status": "affected",
              "version": "3.18.3SP"
            },
            {
              "status": "affected",
              "version": "3.18.4SP"
            },
            {
              "status": "affected",
              "version": "3.18.3aSP"
            },
            {
              "status": "affected",
              "version": "3.18.3bSP"
            },
            {
              "status": "affected",
              "version": "3.9.0E"
            },
            {
              "status": "affected",
              "version": "3.9.1E"
            },
            {
              "status": "affected",
              "version": "3.9.2E"
            },
            {
              "status": "affected",
              "version": "3.9.2bE"
            },
            {
              "status": "affected",
              "version": "16.6.1"
            },
            {
              "status": "affected",
              "version": "16.6.2"
            },
            {
              "status": "affected",
              "version": "16.6.3"
            },
            {
              "status": "affected",
              "version": "16.7.1"
            },
            {
              "status": "affected",
              "version": "16.7.1a"
            },
            {
              "status": "affected",
              "version": "16.7.1b"
            },
            {
              "status": "affected",
              "version": "16.7.2"
            },
            {
              "status": "affected",
              "version": "16.8.1"
            },
            {
              "status": "affected",
              "version": "16.8.1a"
            },
            {
              "status": "affected",
              "version": "16.8.1b"
            },
            {
              "status": "affected",
              "version": "16.8.1s"
            },
            {
              "status": "affected",
              "version": "16.8.1c"
            },
            {
              "status": "affected",
              "version": "16.8.1d"
            },
            {
              "status": "affected",
              "version": "16.8.2"
            },
            {
              "status": "affected",
              "version": "16.9.1b"
            },
            {
              "status": "affected",
              "version": "16.9.1s"
            },
            {
              "status": "affected",
              "version": "16.9.1c"
            },
            {
              "status": "affected",
              "version": "3.10.0E"
            },
            {
              "status": "affected",
              "version": "3.10.1E"
            },
            {
              "status": "affected",
              "version": "3.10.0cE"
            },
            {
              "status": "affected",
              "version": "3.10.1aE"
            },
            {
              "status": "affected",
              "version": "3.10.1sE"
            }
          ]
        }
      ],
      "datePublic": "2019-03-27T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-29T07:06:06.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert"
        },
        {
          "name": "107617",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/107617"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190327-call-home-cert",
        "defect": [
          [
            "CSCvg83741"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-03-27T16:00:00-0700",
          "ID": "CVE-2019-1757",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS and IOS XE Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "3.6.4E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.5E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.6E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.5aE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.5bE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.7E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.8E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.7aE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.6.7bE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.7.4E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.7.5E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.1S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.1aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.2S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.2aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.3S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.2bS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.3aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.4S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.4aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.4bS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.4gS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.5S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.4cS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.4dS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.4eS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.6S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.5aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.5bS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.7S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.6bS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.7aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.16.7bS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.17.0S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.17.1S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.17.2S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.17.1aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.17.3S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.17.4S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.2.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.2.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.8.2E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.8.3E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.8.4E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.8.5E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.8.5aE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.8.6E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.1a"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.4"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.5"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.5b"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.3.6"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.4.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.4.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.4.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.5.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.5.1a"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.5.1b"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.5.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.5.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.0aS"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.0S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.2S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.3S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.4S"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.0SP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1SP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1aSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1gSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1bSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1cSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.2SP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1hSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.2aSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.1iSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.3SP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.4SP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.3aSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.18.3bSP"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.9.0E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.9.1E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.9.2E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.9.2bE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.6.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.6.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.6.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.7.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.7.1a"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.7.1b"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.7.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.8.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.8.1a"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.8.1b"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.8.1s"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.8.1c"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.8.1d"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.8.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.9.1b"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.9.1s"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "16.9.1c"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.10.0E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.10.1E"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.10.0cE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.10.1aE"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "3.10.1sE"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": ""
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "5.9",
            "vectorString": "",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-295"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert"
            },
            {
              "name": "107617",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/107617"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190327-call-home-cert",
          "defect": [
            [
              "CSCvg83741"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1757",
    "datePublished": "2019-03-28T00:20:21.311Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-15T15:15:52.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert\", \"name\": \"20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/107617\", \"name\": \"107617\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T18:28:42.249Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-1757\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-15T15:14:56.593514Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-15T15:15:00.936Z\"}}], \"cna\": {\"title\": \"Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability\", \"source\": {\"defect\": [[\"CSCvg83741\"]], \"advisory\": \"cisco-sa-20190327-call-home-cert\", \"discovery\": \"INTERNAL\"}, \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS and IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.6.4E\"}, {\"status\": \"affected\", \"version\": \"3.6.5E\"}, {\"status\": \"affected\", \"version\": \"3.6.6E\"}, {\"status\": \"affected\", \"version\": \"3.6.5aE\"}, {\"status\": \"affected\", \"version\": \"3.6.5bE\"}, {\"status\": \"affected\", \"version\": \"3.6.7E\"}, {\"status\": \"affected\", \"version\": \"3.6.8E\"}, {\"status\": \"affected\", \"version\": \"3.6.7aE\"}, {\"status\": \"affected\", \"version\": \"3.6.7bE\"}, {\"status\": \"affected\", \"version\": \"3.7.4E\"}, {\"status\": \"affected\", \"version\": \"3.7.5E\"}, {\"status\": \"affected\", \"version\": \"3.16.1S\"}, {\"status\": \"affected\", \"version\": \"3.16.1aS\"}, {\"status\": \"affected\", \"version\": \"3.16.2S\"}, {\"status\": \"affected\", \"version\": \"3.16.2aS\"}, {\"status\": \"affected\", \"version\": \"3.16.3S\"}, {\"status\": \"affected\", \"version\": \"3.16.2bS\"}, {\"status\": \"affected\", \"version\": \"3.16.3aS\"}, {\"status\": \"affected\", \"version\": \"3.16.4S\"}, {\"status\": \"affected\", \"version\": \"3.16.4aS\"}, {\"status\": \"affected\", \"version\": \"3.16.4bS\"}, {\"status\": \"affected\", \"version\": \"3.16.4gS\"}, {\"status\": \"affected\", \"version\": \"3.16.5S\"}, {\"status\": \"affected\", \"version\": \"3.16.4cS\"}, {\"status\": \"affected\", \"version\": \"3.16.4dS\"}, {\"status\": \"affected\", \"version\": \"3.16.4eS\"}, {\"status\": \"affected\", \"version\": \"3.16.6S\"}, {\"status\": \"affected\", \"version\": \"3.16.5aS\"}, {\"status\": \"affected\", \"version\": \"3.16.5bS\"}, {\"status\": \"affected\", \"version\": \"3.16.7S\"}, {\"status\": \"affected\", \"version\": \"3.16.6bS\"}, {\"status\": \"affected\", \"version\": \"3.16.7aS\"}, {\"status\": \"affected\", \"version\": \"3.16.7bS\"}, {\"status\": \"affected\", \"version\": \"3.17.0S\"}, {\"status\": \"affected\", \"version\": \"3.17.1S\"}, {\"status\": \"affected\", \"version\": \"3.17.2S\"}, {\"status\": \"affected\", \"version\": \"3.17.1aS\"}, {\"status\": \"affected\", \"version\": \"3.17.3S\"}, {\"status\": \"affected\", \"version\": \"3.17.4S\"}, {\"status\": \"affected\", \"version\": \"16.2.1\"}, {\"status\": \"affected\", \"version\": \"16.2.2\"}, {\"status\": \"affected\", \"version\": \"3.8.2E\"}, {\"status\": \"affected\", \"version\": \"3.8.3E\"}, {\"status\": \"affected\", \"version\": \"3.8.4E\"}, {\"status\": \"affected\", \"version\": \"3.8.5E\"}, {\"status\": \"affected\", \"version\": \"3.8.5aE\"}, {\"status\": \"affected\", \"version\": \"3.8.6E\"}, {\"status\": \"affected\", \"version\": \"16.3.1\"}, {\"status\": \"affected\", \"version\": \"16.3.2\"}, {\"status\": \"affected\", \"version\": \"16.3.3\"}, {\"status\": \"affected\", \"version\": \"16.3.1a\"}, {\"status\": \"affected\", \"version\": \"16.3.4\"}, {\"status\": \"affected\", \"version\": \"16.3.5\"}, {\"status\": \"affected\", \"version\": \"16.3.5b\"}, {\"status\": \"affected\", \"version\": \"16.3.6\"}, {\"status\": \"affected\", \"version\": \"16.4.1\"}, {\"status\": \"affected\", \"version\": \"16.4.2\"}, {\"status\": \"affected\", \"version\": \"16.4.3\"}, {\"status\": \"affected\", \"version\": \"16.5.1\"}, {\"status\": \"affected\", \"version\": \"16.5.1a\"}, {\"status\": \"affected\", \"version\": \"16.5.1b\"}, {\"status\": \"affected\", \"version\": \"16.5.2\"}, {\"status\": \"affected\", \"version\": \"16.5.3\"}, {\"status\": \"affected\", \"version\": \"3.18.0aS\"}, {\"status\": \"affected\", \"version\": \"3.18.0S\"}, {\"status\": \"affected\", \"version\": \"3.18.1S\"}, {\"status\": \"affected\", \"version\": \"3.18.2S\"}, {\"status\": \"affected\", \"version\": \"3.18.3S\"}, {\"status\": \"affected\", \"version\": \"3.18.4S\"}, {\"status\": \"affected\", \"version\": \"3.18.0SP\"}, {\"status\": \"affected\", \"version\": \"3.18.1SP\"}, {\"status\": \"affected\", \"version\": \"3.18.1aSP\"}, {\"status\": \"affected\", \"version\": \"3.18.1gSP\"}, {\"status\": \"affected\", \"version\": \"3.18.1bSP\"}, {\"status\": \"affected\", \"version\": \"3.18.1cSP\"}, {\"status\": \"affected\", \"version\": \"3.18.2SP\"}, {\"status\": \"affected\", \"version\": \"3.18.1hSP\"}, {\"status\": \"affected\", \"version\": \"3.18.2aSP\"}, {\"status\": \"affected\", \"version\": \"3.18.1iSP\"}, {\"status\": \"affected\", \"version\": \"3.18.3SP\"}, {\"status\": \"affected\", \"version\": \"3.18.4SP\"}, {\"status\": \"affected\", \"version\": \"3.18.3aSP\"}, {\"status\": \"affected\", \"version\": \"3.18.3bSP\"}, {\"status\": \"affected\", \"version\": \"3.9.0E\"}, {\"status\": \"affected\", \"version\": \"3.9.1E\"}, {\"status\": \"affected\", \"version\": \"3.9.2E\"}, {\"status\": \"affected\", \"version\": \"3.9.2bE\"}, {\"status\": \"affected\", \"version\": \"16.6.1\"}, {\"status\": \"affected\", \"version\": \"16.6.2\"}, {\"status\": \"affected\", \"version\": \"16.6.3\"}, {\"status\": \"affected\", \"version\": \"16.7.1\"}, {\"status\": \"affected\", \"version\": \"16.7.1a\"}, {\"status\": \"affected\", \"version\": \"16.7.1b\"}, {\"status\": \"affected\", \"version\": \"16.7.2\"}, {\"status\": \"affected\", \"version\": \"16.8.1\"}, {\"status\": \"affected\", \"version\": \"16.8.1a\"}, {\"status\": \"affected\", \"version\": \"16.8.1b\"}, {\"status\": \"affected\", \"version\": \"16.8.1s\"}, {\"status\": \"affected\", \"version\": \"16.8.1c\"}, {\"status\": \"affected\", \"version\": \"16.8.1d\"}, {\"status\": \"affected\", \"version\": \"16.8.2\"}, {\"status\": \"affected\", \"version\": \"16.9.1b\"}, {\"status\": \"affected\", \"version\": \"16.9.1s\"}, {\"status\": \"affected\", \"version\": \"16.9.1c\"}, {\"status\": \"affected\", \"version\": \"3.10.0E\"}, {\"status\": \"affected\", \"version\": \"3.10.1E\"}, {\"status\": \"affected\", \"version\": \"3.10.0cE\"}, {\"status\": \"affected\", \"version\": \"3.10.1aE\"}, {\"status\": \"affected\", \"version\": \"3.10.1sE\"}]}], \"datePublic\": \"2019-03-27T00:00:00.000Z\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert\", \"name\": \"20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"http://www.securityfocus.com/bid/107617\", \"name\": \"107617\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2019-03-29T07:06:06.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"5.9\", \"vectorString\": \"\"}}, \"source\": {\"defect\": [[\"CSCvg83741\"]], \"advisory\": \"cisco-sa-20190327-call-home-cert\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"3.6.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.6E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.8E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.1S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.1aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.2S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.2aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.3S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.2bS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.3aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.4S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.4aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.4bS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.4gS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.5S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.4cS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.4dS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.4eS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.6S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.5aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.5bS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.7S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.6bS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.7aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.7bS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.17.0S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.17.1S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.17.2S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.17.1aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.17.3S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.17.4S\", \"version_affected\": \"=\"}, {\"version_value\": \"16.2.1\", \"version_affected\": \"=\"}, {\"version_value\": \"16.2.2\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.5aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.6E\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.1\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.2\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.3\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.1a\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.4\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.5\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.5b\", \"version_affected\": \"=\"}, {\"version_value\": \"16.3.6\", \"version_affected\": \"=\"}, {\"version_value\": \"16.4.1\", \"version_affected\": \"=\"}, {\"version_value\": \"16.4.2\", \"version_affected\": \"=\"}, {\"version_value\": \"16.4.3\", \"version_affected\": \"=\"}, {\"version_value\": \"16.5.1\", \"version_affected\": \"=\"}, {\"version_value\": \"16.5.1a\", \"version_affected\": \"=\"}, {\"version_value\": \"16.5.1b\", \"version_affected\": \"=\"}, {\"version_value\": \"16.5.2\", \"version_affected\": \"=\"}, {\"version_value\": \"16.5.3\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.0aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.0S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.2S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.3S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.4S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.0SP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1SP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1aSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1gSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1bSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1cSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.2SP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1hSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.2aSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.1iSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.3SP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.4SP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.3aSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.18.3bSP\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.2bE\", \"version_affected\": \"=\"}, {\"version_value\": \"16.6.1\", \"version_affected\": \"=\"}, {\"version_value\": \"16.6.2\", \"version_affected\": \"=\"}, {\"version_value\": \"16.6.3\", \"version_affected\": \"=\"}, {\"version_value\": \"16.7.1\", \"version_affected\": \"=\"}, {\"version_value\": \"16.7.1a\", \"version_affected\": \"=\"}, {\"version_value\": \"16.7.1b\", \"version_affected\": \"=\"}, {\"version_value\": \"16.7.2\", \"version_affected\": \"=\"}, {\"version_value\": \"16.8.1\", \"version_affected\": \"=\"}, {\"version_value\": \"16.8.1a\", \"version_affected\": \"=\"}, {\"version_value\": \"16.8.1b\", \"version_affected\": \"=\"}, {\"version_value\": \"16.8.1s\", \"version_affected\": \"=\"}, {\"version_value\": \"16.8.1c\", \"version_affected\": \"=\"}, {\"version_value\": \"16.8.1d\", \"version_affected\": \"=\"}, {\"version_value\": \"16.8.2\", \"version_affected\": \"=\"}, {\"version_value\": \"16.9.1b\", \"version_affected\": \"=\"}, {\"version_value\": \"16.9.1s\", \"version_affected\": \"=\"}, {\"version_value\": \"16.9.1c\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.0cE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1sE\", \"version_affected\": \"=\"}]}, \"product_name\": \"Cisco IOS and IOS XE Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert\", \"name\": \"20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability\", \"refsource\": \"CISCO\"}, {\"url\": \"http://www.securityfocus.com/bid/107617\", \"name\": \"107617\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-295\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-1757\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2019-03-27T16:00:00-0700\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2019-1757\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-15T15:15:52.387Z\", \"dateReserved\": \"2018-12-06T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2019-03-28T00:20:21.311Z\", \"assignerShortName\": \"cisco\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…