CVE-2019-1911 vulnerability in Cisco Products
Published on July 6, 2019
Cisco Unified Communications Domain Manager Restricted Shell Escape Vulnerability
A vulnerability in the CLI of Cisco Unified Communications Domain Manager (Cisco Unified CDM) Software could allow an authenticated, local attacker to escape the restricted shell. The vulnerability is due to insufficient input validation of shell commands. An attacker could exploit this vulnerability by executing crafted commands in the shell. A successful exploit could allow the attacker to escape the restricted shell and access commands in the context of the restricted shell user, which does not have root privileges.
Weakness Type
What is a Container Errors Vulnerability?
This entry has been deprecated, as it was not effective as a weakness and was structured more like a category. In addition, the name is inappropriate, since the "container" term is widely understood by developers in different ways than originally intended by PLOVER, the original source for this entry.
CVE-2019-1911 has been classified to as a Container Errors vulnerability or weakness.
Products Associated with CVE-2019-1911
stack.watch emails you whenever new vulnerabilities are published in Cisco Hosted Collaboration Solution or Cisco Unified Communications Domain Manager. Just hit a watch button to start following.
Affected Versions
Cisco Unified Communications Domain Manager:- Version unspecified and below 11.5(3)PB4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.