A vulnerability in the log subscription subsystem of the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The vulnerability is due to insufficient validation of user-supplied input on the web and command-line interface. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.
History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-05-03T16:25:15.485549Z

Updated: 2024-11-21T19:34:24.267Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1816

cve-icon Vulnrichment

Updated: 2024-08-04T18:28:42.843Z

cve-icon NVD

Status : Modified

Published: 2019-05-03T17:29:00.937

Modified: 2024-11-21T04:37:26.523

Link: CVE-2019-1816

cve-icon Redhat

No data.