CVE-2019-1821 Scanner
CVE-2019-1821 scanner - Remote Code Execution (RCE) vulnerability in Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 1 day
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager software are network management tools that allow administrators to monitor and manage network infrastructure. PI provides a unified view of wired and wireless networks, devices, and users. This software makes it easy for administrators to manage and troubleshoot networks from a central location. EPN Manager is a software solution for managing network functions virtualization (NFV) infrastructure. The software provides end-to-end management of NFV infrastructure, including physical and virtual devices, network services, and resources.
Recently, a serious vulnerability was detected in the software of Cisco PI and EPN Manager. CVE-2019-1821 is a vulnerability that allows unauthenticated remote attackers to execute code with root-level privileges on the underlying operating system. This vulnerability is present due to the software's insufficient validation of user inputs. An attacker could upload a malicious file to the administrative web interface and execute the code with root-level privileges. This exploit can cause serious damage to the infrastructure of a network.
If this vulnerability is successfully exploited, an attacker can execute arbitrary commands on the underlying operating system and take over the entire network. An attacker can delete critical data, install malware and launch a persistent campaign of attack. This attack can cause a complete breach of network security resulting in tremendous financial losses or permanently damage or degrade the business values of an organization.
By using the s4e.io platform, users can easily and quickly learn about vulnerabilities in their digital assets without having to dedicate a lot of time or effort. With the pro features of the platform, users can monitor their networks, schedule vulnerability scans, and receive automated alerts when vulnerabilities are detected. In this way, it is possible to take the necessary precautions to prevent attacks from occurring and protect the infrastructure of a network.
REFERENCES