cisco vsmart-controller CVE-2019-1651 vulnerability in Cisco Products
Published on January 24, 2019

Cisco SD-WAN Solution Buffer Overflow Vulnerability
A vulnerability in the vContainer of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to cause a denial of service (DoS) condition and execute arbitrary code as the root user. The vulnerability is due to improper bounds checking by the vContainer. An attacker could exploit this vulnerability by sending a malicious file to an affected vContainer instance. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected vContainer, which could result in a DoS condition that the attacker could use to execute arbitrary code as the root user.

Vendor Advisory NVD

Weakness Type

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2019-1651 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2019-1651

stack.watch emails you whenever new vulnerabilities are published in Cisco Vsmart Controller or Cisco Sd Wan. Just hit a watch button to start following.

 
 

Affected Versions

Cisco SD-WAN Solution Version n/a is affected by CVE-2019-1651

Exploit Probability

EPSS
1.55%
Percentile
81.19%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.