CVE-2019-1651 vulnerability in Cisco Products
Published on January 24, 2019
Cisco SD-WAN Solution Buffer Overflow Vulnerability
A vulnerability in the vContainer of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to cause a denial of service (DoS) condition and execute arbitrary code as the root user. The vulnerability is due to improper bounds checking by the vContainer. An attacker could exploit this vulnerability by sending a malicious file to an affected vContainer instance. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected vContainer, which could result in a DoS condition that the attacker could use to execute arbitrary code as the root user.
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2019-1651 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2019-1651
stack.watch emails you whenever new vulnerabilities are published in Cisco Vsmart Controller or Cisco Sd Wan. Just hit a watch button to start following.
Affected Versions
Cisco SD-WAN Solution Version n/a is affected by CVE-2019-1651Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.