Show plain JSON{"containers": {"cna": {"affected": [{"product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [{"status": "affected", "version": "16.2.1"}, {"status": "affected", "version": "16.2.2"}, {"status": "affected", "version": "16.3.1"}, {"status": "affected", "version": "16.3.2"}, {"status": "affected", "version": "16.3.3"}, {"status": "affected", "version": "16.3.1a"}, {"status": "affected", "version": "16.3.4"}, {"status": "affected", "version": "16.3.5"}, {"status": "affected", "version": "16.3.5b"}, {"status": "affected", "version": "16.3.6"}, {"status": "affected", "version": "16.4.1"}, {"status": "affected", "version": "16.4.2"}, {"status": "affected", "version": "16.4.3"}, {"status": "affected", "version": "16.5.1"}, {"status": "affected", "version": "16.5.1a"}, {"status": "affected", "version": "16.5.1b"}, {"status": "affected", "version": "16.5.2"}, {"status": "affected", "version": "16.5.3"}, {"status": "affected", "version": "16.6.1"}, {"status": "affected", "version": "16.6.2"}, {"status": "affected", "version": "16.6.3"}, {"status": "affected", "version": "16.7.1"}, {"status": "affected", "version": "16.7.1a"}, {"status": "affected", "version": "16.7.1b"}, {"status": "affected", "version": "16.8.1"}, {"status": "affected", "version": "16.8.1a"}, {"status": "affected", "version": "16.8.1b"}, {"status": "affected", "version": "16.8.1s"}, {"status": "affected", "version": "16.8.1c"}, {"status": "affected", "version": "16.8.1d"}, {"status": "affected", "version": "16.8.1e"}]}], "datePublic": "2019-03-27T00:00:00", "descriptions": [{"lang": "en", "value": "A vulnerability in the web UI framework of Cisco IOS XE Software could allow an authenticated, remote attacker to make unauthorized changes to the filesystem of the affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the device. An exploit could allow the attacker to gain elevated privileges on the affected device."}], "exploits": [{"lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "metrics": [{"cvssV3_0": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2019-03-28T07:06:20", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco"}, "references": [{"name": "20190327 Cisco IOS XE Software Arbitrary File Upload Vulnerability", "tags": ["vendor-advisory", "x_refsource_CISCO"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu"}, {"name": "107591", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/107591"}], "source": {"advisory": "cisco-sa-20190327-afu", "defect": [["CSCvi48984"]], "discovery": "INTERNAL"}, "title": "Cisco IOS XE Software Arbitrary File Upload Vulnerability", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-27T16:00:00-0700", "ID": "CVE-2019-1743", "STATE": "PUBLIC", "TITLE": "Cisco IOS XE Software Arbitrary File Upload Vulnerability"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Cisco IOS XE Software", "version": {"version_data": [{"version_affected": "=", "version_value": "16.2.1"}, {"version_affected": "=", "version_value": "16.2.2"}, {"version_affected": "=", "version_value": "16.3.1"}, {"version_affected": "=", "version_value": "16.3.2"}, {"version_affected": "=", "version_value": "16.3.3"}, {"version_affected": "=", "version_value": "16.3.1a"}, {"version_affected": "=", "version_value": "16.3.4"}, {"version_affected": "=", "version_value": "16.3.5"}, {"version_affected": "=", "version_value": "16.3.5b"}, {"version_affected": "=", "version_value": "16.3.6"}, {"version_affected": "=", "version_value": "16.4.1"}, {"version_affected": "=", "version_value": "16.4.2"}, {"version_affected": "=", "version_value": "16.4.3"}, {"version_affected": "=", "version_value": "16.5.1"}, {"version_affected": "=", "version_value": "16.5.1a"}, {"version_affected": "=", "version_value": "16.5.1b"}, {"version_affected": "=", "version_value": "16.5.2"}, {"version_affected": "=", "version_value": "16.5.3"}, {"version_affected": "=", "version_value": "16.6.1"}, {"version_affected": "=", "version_value": "16.6.2"}, {"version_affected": "=", "version_value": "16.6.3"}, {"version_affected": "=", "version_value": "16.7.1"}, {"version_affected": "=", "version_value": "16.7.1a"}, {"version_affected": "=", "version_value": "16.7.1b"}, {"version_affected": "=", "version_value": "16.8.1"}, {"version_affected": "=", "version_value": "16.8.1a"}, {"version_affected": "=", "version_value": "16.8.1b"}, {"version_affected": "=", "version_value": "16.8.1s"}, {"version_affected": "=", "version_value": "16.8.1c"}, {"version_affected": "=", "version_value": "16.8.1d"}, {"version_affected": "=", "version_value": "16.8.1e"}]}}]}, "vendor_name": "Cisco"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A vulnerability in the web UI framework of Cisco IOS XE Software could allow an authenticated, remote attacker to make unauthorized changes to the filesystem of the affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the device. An exploit could allow the attacker to gain elevated privileges on the affected device."}]}, "exploit": [{"lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "impact": {"cvss": {"baseScore": "8.8", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-20"}]}]}, "references": {"reference_data": [{"name": "20190327 Cisco IOS XE Software Arbitrary File Upload Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu"}, {"name": "107591", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107591"}]}, "source": {"advisory": "cisco-sa-20190327-afu", "defect": [["CSCvi48984"]], "discovery": "INTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T18:28:42.444Z"}, "title": "CVE Program Container", "references": [{"name": "20190327 Cisco IOS XE Software Arbitrary File Upload Vulnerability", "tags": ["vendor-advisory", "x_refsource_CISCO", "x_transferred"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu"}, {"name": "107591", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/107591"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-11-20T16:55:31.695902Z", "id": "CVE-2019-1743", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-11-20T17:25:25.614Z"}}]}, "cveMetadata": {"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1743", "datePublished": "2019-03-27T23:35:36.530645Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:25:25.614Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}