Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-1755

A vulnerability in the Web Services Management Agent (WSMA) function of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary Cisco IOS commands as a privilege level 15 user. The vulnerability occurs because the affected software improperly sanitizes user-supplied input. An attacker could exploit this vulnerability by submitting crafted HTTP requests to the targeted application. A successful exploit could allow the attacker to execute arbitrary commands on the affected device.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 53.5%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 9.0
Products affected by CVE-2019-1755
  • Cisco » Ios Xe » Version: 16.1.1
    cpe:2.3:o:cisco:ios_xe:16.1.1
  • Cisco » Ios Xe » Version: 16.1.2
    cpe:2.3:o:cisco:ios_xe:16.1.2
  • Cisco » Ios Xe » Version: 16.1.3
    cpe:2.3:o:cisco:ios_xe:16.1.3
  • Cisco » Ios Xe » Version: 16.2.1
    cpe:2.3:o:cisco:ios_xe:16.2.1
  • Cisco » Ios Xe » Version: 16.2.2
    cpe:2.3:o:cisco:ios_xe:16.2.2
  • Cisco » Ios Xe » Version: 16.3.1
    cpe:2.3:o:cisco:ios_xe:16.3.1
  • Cisco » Ios Xe » Version: 16.3.1a
    cpe:2.3:o:cisco:ios_xe:16.3.1a
  • Cisco » Ios Xe » Version: 16.3.2
    cpe:2.3:o:cisco:ios_xe:16.3.2
  • Cisco » Ios Xe » Version: 16.3.3
    cpe:2.3:o:cisco:ios_xe:16.3.3
  • Cisco » Ios Xe » Version: 16.3.4
    cpe:2.3:o:cisco:ios_xe:16.3.4
  • Cisco » Ios Xe » Version: 16.3.5
    cpe:2.3:o:cisco:ios_xe:16.3.5
  • Cisco » Ios Xe » Version: 16.3.5b
    cpe:2.3:o:cisco:ios_xe:16.3.5b
  • Cisco » Ios Xe » Version: 16.3.6
    cpe:2.3:o:cisco:ios_xe:16.3.6
  • Cisco » Ios Xe » Version: 16.3.7
    cpe:2.3:o:cisco:ios_xe:16.3.7
  • Cisco » Ios Xe » Version: 16.3.8
    cpe:2.3:o:cisco:ios_xe:16.3.8
  • Cisco » Ios Xe » Version: 16.4.1
    cpe:2.3:o:cisco:ios_xe:16.4.1
  • Cisco » Ios Xe » Version: 16.4.2
    cpe:2.3:o:cisco:ios_xe:16.4.2
  • Cisco » Ios Xe » Version: 16.4.3
    cpe:2.3:o:cisco:ios_xe:16.4.3
  • Cisco » Ios Xe » Version: 16.5.1
    cpe:2.3:o:cisco:ios_xe:16.5.1
  • Cisco » Ios Xe » Version: 16.5.1a
    cpe:2.3:o:cisco:ios_xe:16.5.1a
  • Cisco » Ios Xe » Version: 16.5.1b
    cpe:2.3:o:cisco:ios_xe:16.5.1b
  • Cisco » Ios Xe » Version: 16.5.2
    cpe:2.3:o:cisco:ios_xe:16.5.2
  • Cisco » Ios Xe » Version: 16.5.3
    cpe:2.3:o:cisco:ios_xe:16.5.3
  • Cisco » Ios Xe » Version: 16.6.1
    cpe:2.3:o:cisco:ios_xe:16.6.1
  • Cisco » Ios Xe » Version: 16.6.2
    cpe:2.3:o:cisco:ios_xe:16.6.2
  • Cisco » Ios Xe » Version: 16.6.3
    cpe:2.3:o:cisco:ios_xe:16.6.3
  • Cisco » Ios Xe » Version: 16.7.1
    cpe:2.3:o:cisco:ios_xe:16.7.1
  • Cisco » Ios Xe » Version: 16.7.1a
    cpe:2.3:o:cisco:ios_xe:16.7.1a
  • Cisco » Ios Xe » Version: 16.7.1b
    cpe:2.3:o:cisco:ios_xe:16.7.1b
  • Cisco » Ios Xe » Version: 16.8.1
    cpe:2.3:o:cisco:ios_xe:16.8.1
  • Cisco » Ios Xe » Version: 16.8.1a
    cpe:2.3:o:cisco:ios_xe:16.8.1a
  • Cisco » Ios Xe » Version: 16.8.1b
    cpe:2.3:o:cisco:ios_xe:16.8.1b
  • Cisco » Ios Xe » Version: 16.8.1c
    cpe:2.3:o:cisco:ios_xe:16.8.1c
  • Cisco » Ios Xe » Version: 16.8.1d
    cpe:2.3:o:cisco:ios_xe:16.8.1d
  • Cisco » Ios Xe » Version: 16.8.1e
    cpe:2.3:o:cisco:ios_xe:16.8.1e
  • Cisco » Ios Xe » Version: 16.8.1s
    cpe:2.3:o:cisco:ios_xe:16.8.1s
  • Cisco » Ios Xe » Version: 3.2.0ja
    cpe:2.3:o:cisco:ios_xe:3.2.0ja
  • Cisco » Ios Xe » Version: 3.6.10e
    cpe:2.3:o:cisco:ios_xe:3.6.10e


Contact Us

Shodan ® - All rights reserved