A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 04:23
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-ios-gos-auth - Vendor Advisory | 
Information
                Published : 2019-09-25 20:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12648
Mitre link : CVE-2019-12648
CVE.ORG link : CVE-2019-12648
JSON object : View
Products Affected
                cisco
- 807_industrial_integrated_services_routers
- 829_industrial_integrated_services_routers
- cgr_1120
- ios
- 809_industrial_integrated_services_routers
- cgr1240
