Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-1743

A vulnerability in the web UI framework of Cisco IOS XE Software could allow an authenticated, remote attacker to make unauthorized changes to the filesystem of the affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the device. An exploit could allow the attacker to gain elevated privileges on the affected device.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.5%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2019-1743
  • Cisco » Ios Xe » Version: 16.2.1
    cpe:2.3:o:cisco:ios_xe:16.2.1
  • Cisco » Ios Xe » Version: 16.2.2
    cpe:2.3:o:cisco:ios_xe:16.2.2
  • Cisco » Ios Xe » Version: 16.3.1
    cpe:2.3:o:cisco:ios_xe:16.3.1
  • Cisco » Ios Xe » Version: 16.3.1a
    cpe:2.3:o:cisco:ios_xe:16.3.1a
  • Cisco » Ios Xe » Version: 16.3.2
    cpe:2.3:o:cisco:ios_xe:16.3.2
  • Cisco » Ios Xe » Version: 16.3.3
    cpe:2.3:o:cisco:ios_xe:16.3.3
  • Cisco » Ios Xe » Version: 16.3.4
    cpe:2.3:o:cisco:ios_xe:16.3.4
  • Cisco » Ios Xe » Version: 16.3.5
    cpe:2.3:o:cisco:ios_xe:16.3.5
  • Cisco » Ios Xe » Version: 16.3.5b
    cpe:2.3:o:cisco:ios_xe:16.3.5b
  • Cisco » Ios Xe » Version: 16.3.6
    cpe:2.3:o:cisco:ios_xe:16.3.6
  • Cisco » Ios Xe » Version: 16.4.1
    cpe:2.3:o:cisco:ios_xe:16.4.1
  • Cisco » Ios Xe » Version: 16.4.2
    cpe:2.3:o:cisco:ios_xe:16.4.2
  • Cisco » Ios Xe » Version: 16.4.3
    cpe:2.3:o:cisco:ios_xe:16.4.3
  • Cisco » Ios Xe » Version: 16.5.1
    cpe:2.3:o:cisco:ios_xe:16.5.1
  • Cisco » Ios Xe » Version: 16.5.1a
    cpe:2.3:o:cisco:ios_xe:16.5.1a
  • Cisco » Ios Xe » Version: 16.5.1b
    cpe:2.3:o:cisco:ios_xe:16.5.1b
  • Cisco » Ios Xe » Version: 16.5.2
    cpe:2.3:o:cisco:ios_xe:16.5.2
  • Cisco » Ios Xe » Version: 16.5.3
    cpe:2.3:o:cisco:ios_xe:16.5.3
  • Cisco » Ios Xe » Version: 16.6.1
    cpe:2.3:o:cisco:ios_xe:16.6.1
  • Cisco » Ios Xe » Version: 16.6.2
    cpe:2.3:o:cisco:ios_xe:16.6.2
  • Cisco » Ios Xe » Version: 16.6.3
    cpe:2.3:o:cisco:ios_xe:16.6.3
  • Cisco » Ios Xe » Version: 16.7.1
    cpe:2.3:o:cisco:ios_xe:16.7.1
  • Cisco » Ios Xe » Version: 16.7.1a
    cpe:2.3:o:cisco:ios_xe:16.7.1a
  • Cisco » Ios Xe » Version: 16.7.1b
    cpe:2.3:o:cisco:ios_xe:16.7.1b
  • Cisco » Ios Xe » Version: 16.8.1
    cpe:2.3:o:cisco:ios_xe:16.8.1
  • Cisco » Ios Xe » Version: 16.8.1a
    cpe:2.3:o:cisco:ios_xe:16.8.1a
  • Cisco » Ios Xe » Version: 16.8.1b
    cpe:2.3:o:cisco:ios_xe:16.8.1b
  • Cisco » Ios Xe » Version: 16.8.1c
    cpe:2.3:o:cisco:ios_xe:16.8.1c
  • Cisco » Ios Xe » Version: 16.8.1d
    cpe:2.3:o:cisco:ios_xe:16.8.1d
  • Cisco » Ios Xe » Version: 16.8.1e
    cpe:2.3:o:cisco:ios_xe:16.8.1e
  • Cisco » Ios Xe » Version: 16.8.1s
    cpe:2.3:o:cisco:ios_xe:16.8.1s


Contact Us

Shodan ® - All rights reserved