CVE-2019-1821 Scanner

CVE-2019-1821 scanner - Remote Code Execution (RCE) vulnerability in Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month 1 day

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager software are network management tools that allow administrators to monitor and manage network infrastructure. PI provides a unified view of wired and wireless networks, devices, and users. This software makes it easy for administrators to manage and troubleshoot networks from a central location. EPN Manager is a software solution for managing network functions virtualization (NFV) infrastructure. The software provides end-to-end management of NFV infrastructure, including physical and virtual devices, network services, and resources.

Recently, a serious vulnerability was detected in the software of Cisco PI and EPN Manager. CVE-2019-1821 is a vulnerability that allows unauthenticated remote attackers to execute code with root-level privileges on the underlying operating system. This vulnerability is present due to the software's insufficient validation of user inputs. An attacker could upload a malicious file to the administrative web interface and execute the code with root-level privileges. This exploit can cause serious damage to the infrastructure of a network.

If this vulnerability is successfully exploited, an attacker can execute arbitrary commands on the underlying operating system and take over the entire network. An attacker can delete critical data, install malware and launch a persistent campaign of attack. This attack can cause a complete breach of network security resulting in tremendous financial losses or permanently damage or degrade the business values of an organization.

By using the s4e.io platform, users can easily and quickly learn about vulnerabilities in their digital assets without having to dedicate a lot of time or effort. With the pro features of the platform, users can monitor their networks, schedule vulnerability scans, and receive automated alerts when vulnerabilities are detected. In this way, it is possible to take the necessary precautions to prevent attacks from occurring and protect the infrastructure of a network.

 

REFERENCES

Get started to protecting your Free Full Security Scan