A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to elevate privileges and execute administrative functions on an affected device. The vulnerability is due to insufficient authorization validation. An attacker could exploit this vulnerability by logging in to an affected device as a low-privileged user and then sending specific HTTPS requests to execute administrative functions using the information retrieved during initial login.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-asa-privescala | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2019-08-07T00:00:00
Updated: 2019-08-07T21:20:16
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1934
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-08-07T22:15:15.837
Modified: 2023-08-11T19:03:30.373
Link: CVE-2019-1934
JSON object: View
Redhat Information
No data.
CWE