BDU:2019-01316
Vulnerability from fstec - Published: 27.03.2019
VLAI Severity ?
Title
Уязвимость операционной системы Cisco IOS XE, позволяющая нарушителю выполнять произвольные команды с повышенными привилегиями
Description
Уязвимость операционной системы Cisco IOS XE существует из-за недостаточной проверки ввода команд, предоставленных пользователем. Эксплуатация уязвимости может позволить нарушителю, прошедшему проверку подлинности, выполнять произвольные команды с повышенными привилегиями путем отправки специально сформированных команд
Severity ?
Vendor
Cisco Systems Inc.
Software Name
Cisco IOS XE
Software Version
3.10.8as (Cisco IOS XE), 3.12.0s (Cisco IOS XE), 3.12.1s (Cisco IOS XE), 3.12.2s (Cisco IOS XE), 3.12.3s (Cisco IOS XE), 3.12.4s (Cisco IOS XE), 3.13.1s (Cisco IOS XE), 3.13.2s (Cisco IOS XE), 3.13.4s (Cisco IOS XE), 3.14.0s (Cisco IOS XE), 3.14.1s (Cisco IOS XE), 3.14.2s (Cisco IOS XE), 3.14.3s (Cisco IOS XE), 3.14.4s (Cisco IOS XE), 3.15.0s (Cisco IOS XE), 3.15.1s (Cisco IOS XE), 3.15.2s (Cisco IOS XE), 3.15.3s (Cisco IOS XE), 3.16.1as (Cisco IOS XE), 3.16.2as (Cisco IOS XE), 3.16.2s (Cisco IOS XE), 3.17.0s (Cisco IOS XE), 3.17.1s (Cisco IOS XE), 3.18.0s (Cisco IOS XE), 16.5.1 (Cisco IOS XE), 16.1.1 (Cisco IOS XE), 16.1.2 (Cisco IOS XE), 16.1.3 (Cisco IOS XE), 16.3.1a (Cisco IOS XE), 16.5.1a (Cisco IOS XE), 16.2.1 (Cisco IOS XE), 16.2.2 (Cisco IOS XE), 16.3.1 (Cisco IOS XE), 16.3.2 (Cisco IOS XE), 16.3.3 (Cisco IOS XE), 16.3.4 (Cisco IOS XE), 16.3.5 (Cisco IOS XE), 16.3.5b (Cisco IOS XE), 16.4.1 (Cisco IOS XE), 16.6.1 (Cisco IOS XE), 16.6.4 (Cisco IOS XE), 16.7.1b (Cisco IOS XE), 16.4.3 (Cisco IOS XE), 16.7.2 (Cisco IOS XE), 3.10.0S (Cisco IOS XE), 3.10.1S (Cisco IOS XE), 3.10.2S (Cisco IOS XE), 3.10.3S (Cisco IOS XE), 3.10.4S (Cisco IOS XE), 3.10.5S (Cisco IOS XE), 3.10.6S (Cisco IOS XE), 3.10.2aS (Cisco IOS XE), 3.10.2tS (Cisco IOS XE), 3.10.7S (Cisco IOS XE), 3.10.9S (Cisco IOS XE), 3.10.10S (Cisco IOS XE), 3.11.1S (Cisco IOS XE), 3.11.2S (Cisco IOS XE), 3.11.0S (Cisco IOS XE), 3.11.3S (Cisco IOS XE), 3.11.4S (Cisco IOS XE), 3.12.0aS (Cisco IOS XE), 3.13.0S (Cisco IOS XE), 3.13.3S (Cisco IOS XE), 3.13.5aS (Cisco IOS XE), 3.13.6S (Cisco IOS XE), 3.13.7S (Cisco IOS XE), 3.13.6aS (Cisco IOS XE), 3.13.6bS (Cisco IOS XE), 3.13.8S (Cisco IOS XE), 3.13.9S (Cisco IOS XE), 3.15.1cS (Cisco IOS XE), 3.15.4S (Cisco IOS XE), 3.16.1S (Cisco IOS XE), 3.16.0bS (Cisco IOS XE), 3.16.0cS (Cisco IOS XE), 3.16.3S (Cisco IOS XE), 3.16.2bS (Cisco IOS XE), 3.16.4aS (Cisco IOS XE), 3.16.4bS (Cisco IOS XE), 3.16.4gS (Cisco IOS XE), 3.16.5S (Cisco IOS XE), 3.16.4cS (Cisco IOS XE), 3.16.4dS (Cisco IOS XE), 3.16.4eS (Cisco IOS XE), 3.16.6S (Cisco IOS XE), 3.16.5aS (Cisco IOS XE), 3.16.5bS (Cisco IOS XE), 3.16.7S (Cisco IOS XE), 3.16.6bS (Cisco IOS XE), 3.16.7aS (Cisco IOS XE), 3.16.7bS (Cisco IOS XE), 3.17.2S (Cisco IOS XE), 3.17.1aS (Cisco IOS XE), 3.17.3S (Cisco IOS XE), 3.17.4S (Cisco IOS XE), 16.3.6 (Cisco IOS XE), 16.4.2 (Cisco IOS XE), 16.5.1b (Cisco IOS XE), 16.5.2 (Cisco IOS XE), 16.5.3 (Cisco IOS XE), 16.6.2 (Cisco IOS XE), 16.6.3 (Cisco IOS XE), 16.7.1 (Cisco IOS XE), 16.7.1a (Cisco IOS XE), 16.8.1 (Cisco IOS XE), 16.8.1s (Cisco IOS XE), 16.9.1b (Cisco IOS XE), 3.13.10S (Cisco IOS XE), 3.6.10E (Cisco IOS XE), 3.16.0aS (Cisco IOS XE), 3.16.3aS (Cisco IOS XE), 3.16.4S (Cisco IOS XE), 3.16.8S (Cisco IOS XE), 16.3.7 (Cisco IOS XE), 3.18.0aS (Cisco IOS XE), 3.18.1S (Cisco IOS XE), 3.18.2S (Cisco IOS XE), 3.18.3S (Cisco IOS XE), 3.18.4S (Cisco IOS XE), 3.18.0SP (Cisco IOS XE), 3.18.1SP (Cisco IOS XE), 3.18.1aSP (Cisco IOS XE), 3.18.1gSP (Cisco IOS XE), 3.18.1bSP (Cisco IOS XE), 3.18.1cSP (Cisco IOS XE), 3.18.2SP (Cisco IOS XE), 3.18.1hSP (Cisco IOS XE), 3.18.2aSP (Cisco IOS XE), 3.18.1iSP (Cisco IOS XE), 3.18.3SP (Cisco IOS XE), 3.18.4SP (Cisco IOS XE), 3.18.3aSP (Cisco IOS XE), 3.18.3bSP (Cisco IOS XE), 3.18.5SP (Cisco IOS XE), 16.6.4s (Cisco IOS XE), 16.6.4a (Cisco IOS XE), 16.8.1b (Cisco IOS XE), 16.8.1a (Cisco IOS XE), 16.8.1c (Cisco IOS XE), 16.8.1d (Cisco IOS XE), 16.8.2 (Cisco IOS XE), 16.8.1e (Cisco IOS XE), 16.9.1 (Cisco IOS XE), 16.9.2 (Cisco IOS XE), 16.9.1a (Cisco IOS XE), 16.9.1s (Cisco IOS XE), 16.9.1c (Cisco IOS XE), 16.9.1d (Cisco IOS XE), 16.9.2a (Cisco IOS XE)
Possible Mitigations
Иcпользование рекомендаций:
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-71135
Reference
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xecmd
CWE
CWE-78
{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "3.10.8as (Cisco IOS XE), 3.12.0s (Cisco IOS XE), 3.12.1s (Cisco IOS XE), 3.12.2s (Cisco IOS XE), 3.12.3s (Cisco IOS XE), 3.12.4s (Cisco IOS XE), 3.13.1s (Cisco IOS XE), 3.13.2s (Cisco IOS XE), 3.13.4s (Cisco IOS XE), 3.14.0s (Cisco IOS XE), 3.14.1s (Cisco IOS XE), 3.14.2s (Cisco IOS XE), 3.14.3s (Cisco IOS XE), 3.14.4s (Cisco IOS XE), 3.15.0s (Cisco IOS XE), 3.15.1s (Cisco IOS XE), 3.15.2s (Cisco IOS XE), 3.15.3s (Cisco IOS XE), 3.16.1as (Cisco IOS XE), 3.16.2as (Cisco IOS XE), 3.16.2s (Cisco IOS XE), 3.17.0s (Cisco IOS XE), 3.17.1s (Cisco IOS XE), 3.18.0s (Cisco IOS XE), 16.5.1 (Cisco IOS XE), 16.1.1 (Cisco IOS XE), 16.1.2 (Cisco IOS XE), 16.1.3 (Cisco IOS XE), 16.3.1a (Cisco IOS XE), 16.5.1a (Cisco IOS XE), 16.2.1 (Cisco IOS XE), 16.2.2 (Cisco IOS XE), 16.3.1 (Cisco IOS XE), 16.3.2 (Cisco IOS XE), 16.3.3 (Cisco IOS XE), 16.3.4 (Cisco IOS XE), 16.3.5 (Cisco IOS XE), 16.3.5b (Cisco IOS XE), 16.4.1 (Cisco IOS XE), 16.6.1 (Cisco IOS XE), 16.6.4 (Cisco IOS XE), 16.7.1b (Cisco IOS XE), 16.4.3 (Cisco IOS XE), 16.7.2 (Cisco IOS XE), 3.10.0S (Cisco IOS XE), 3.10.1S (Cisco IOS XE), 3.10.2S (Cisco IOS XE), 3.10.3S (Cisco IOS XE), 3.10.4S (Cisco IOS XE), 3.10.5S (Cisco IOS XE), 3.10.6S (Cisco IOS XE), 3.10.2aS (Cisco IOS XE), 3.10.2tS (Cisco IOS XE), 3.10.7S (Cisco IOS XE), 3.10.9S (Cisco IOS XE), 3.10.10S (Cisco IOS XE), 3.11.1S (Cisco IOS XE), 3.11.2S (Cisco IOS XE), 3.11.0S (Cisco IOS XE), 3.11.3S (Cisco IOS XE), 3.11.4S (Cisco IOS XE), 3.12.0aS (Cisco IOS XE), 3.13.0S (Cisco IOS XE), 3.13.3S (Cisco IOS XE), 3.13.5aS (Cisco IOS XE), 3.13.6S (Cisco IOS XE), 3.13.7S (Cisco IOS XE), 3.13.6aS (Cisco IOS XE), 3.13.6bS (Cisco IOS XE), 3.13.8S (Cisco IOS XE), 3.13.9S (Cisco IOS XE), 3.15.1cS (Cisco IOS XE), 3.15.4S (Cisco IOS XE), 3.16.1S (Cisco IOS XE), 3.16.0bS (Cisco IOS XE), 3.16.0cS (Cisco IOS XE), 3.16.3S (Cisco IOS XE), 3.16.2bS (Cisco IOS XE), 3.16.4aS (Cisco IOS XE), 3.16.4bS (Cisco IOS XE), 3.16.4gS (Cisco IOS XE), 3.16.5S (Cisco IOS XE), 3.16.4cS (Cisco IOS XE), 3.16.4dS (Cisco IOS XE), 3.16.4eS (Cisco IOS XE), 3.16.6S (Cisco IOS XE), 3.16.5aS (Cisco IOS XE), 3.16.5bS (Cisco IOS XE), 3.16.7S (Cisco IOS XE), 3.16.6bS (Cisco IOS XE), 3.16.7aS (Cisco IOS XE), 3.16.7bS (Cisco IOS XE), 3.17.2S (Cisco IOS XE), 3.17.1aS (Cisco IOS XE), 3.17.3S (Cisco IOS XE), 3.17.4S (Cisco IOS XE), 16.3.6 (Cisco IOS XE), 16.4.2 (Cisco IOS XE), 16.5.1b (Cisco IOS XE), 16.5.2 (Cisco IOS XE), 16.5.3 (Cisco IOS XE), 16.6.2 (Cisco IOS XE), 16.6.3 (Cisco IOS XE), 16.7.1 (Cisco IOS XE), 16.7.1a (Cisco IOS XE), 16.8.1 (Cisco IOS XE), 16.8.1s (Cisco IOS XE), 16.9.1b (Cisco IOS XE), 3.13.10S (Cisco IOS XE), 3.6.10E (Cisco IOS XE), 3.16.0aS (Cisco IOS XE), 3.16.3aS (Cisco IOS XE), 3.16.4S (Cisco IOS XE), 3.16.8S (Cisco IOS XE), 16.3.7 (Cisco IOS XE), 3.18.0aS (Cisco IOS XE), 3.18.1S (Cisco IOS XE), 3.18.2S (Cisco IOS XE), 3.18.3S (Cisco IOS XE), 3.18.4S (Cisco IOS XE), 3.18.0SP (Cisco IOS XE), 3.18.1SP (Cisco IOS XE), 3.18.1aSP (Cisco IOS XE), 3.18.1gSP (Cisco IOS XE), 3.18.1bSP (Cisco IOS XE), 3.18.1cSP (Cisco IOS XE), 3.18.2SP (Cisco IOS XE), 3.18.1hSP (Cisco IOS XE), 3.18.2aSP (Cisco IOS XE), 3.18.1iSP (Cisco IOS XE), 3.18.3SP (Cisco IOS XE), 3.18.4SP (Cisco IOS XE), 3.18.3aSP (Cisco IOS XE), 3.18.3bSP (Cisco IOS XE), 3.18.5SP (Cisco IOS XE), 16.6.4s (Cisco IOS XE), 16.6.4a (Cisco IOS XE), 16.8.1b (Cisco IOS XE), 16.8.1a (Cisco IOS XE), 16.8.1c (Cisco IOS XE), 16.8.1d (Cisco IOS XE), 16.8.2 (Cisco IOS XE), 16.8.1e (Cisco IOS XE), 16.9.1 (Cisco IOS XE), 16.9.2 (Cisco IOS XE), 16.9.1a (Cisco IOS XE), 16.9.1s (Cisco IOS XE), 16.9.1c (Cisco IOS XE), 16.9.1d (Cisco IOS XE), 16.9.2a (Cisco IOS XE)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418c\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://tools.cisco.com/security/center/viewErp.x?alertId=ERP-71135",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.03.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01316",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-1745",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS XE",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Cisco IOS XE, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b) (CWE-78)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Cisco IOS XE \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0432\u0432\u043e\u0434\u0430 \u043a\u043e\u043c\u0430\u043d\u0434, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xecmd",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-78",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…