{"containers":{"cna":{"affected":[{"product":"Cisco IOS and IOS XE Software","vendor":"Cisco","versions":[{"status":"affected","version":"3.6.4E"},{"status":"affected","version":"3.6.5E"},{"status":"affected","version":"3.6.6E"},{"status":"affected","version":"3.6.5aE"},{"status":"affected","version":"3.6.5bE"},{"status":"affected","version":"3.6.7E"},{"status":"affected","version":"3.6.8E"},{"status":"affected","version":"3.6.7aE"},{"status":"affected","version":"3.6.7bE"},{"status":"affected","version":"3.7.4E"},{"status":"affected","version":"3.7.5E"},{"status":"affected","version":"3.16.1S"},{"status":"affected","version":"3.16.1aS"},{"status":"affected","version":"3.16.2S"},{"status":"affected","version":"3.16.2aS"},{"status":"affected","version":"3.16.3S"},{"status":"affected","version":"3.16.2bS"},{"status":"affected","version":"3.16.3aS"},{"status":"affected","version":"3.16.4S"},{"status":"affected","version":"3.16.4aS"},{"status":"affected","version":"3.16.4bS"},{"status":"affected","version":"3.16.4gS"},{"status":"affected","version":"3.16.5S"},{"status":"affected","version":"3.16.4cS"},{"status":"affected","version":"3.16.4dS"},{"status":"affected","version":"3.16.4eS"},{"status":"affected","version":"3.16.6S"},{"status":"affected","version":"3.16.5aS"},{"status":"affected","version":"3.16.5bS"},{"status":"affected","version":"3.16.7S"},{"status":"affected","version":"3.16.6bS"},{"status":"affected","version":"3.16.7aS"},{"status":"affected","version":"3.16.7bS"},{"status":"affected","version":"3.17.0S"},{"status":"affected","version":"3.17.1S"},{"status":"affected","version":"3.17.2S"},{"status":"affected","version":"3.17.1aS"},{"status":"affected","version":"3.17.3S"},{"status":"affected","version":"3.17.4S"},{"status":"affected","version":"16.2.1"},{"status":"affected","version":"16.2.2"},{"status":"affected","version":"3.8.2E"},{"status":"affected","version":"3.8.3E"},{"status":"affected","version":"3.8.4E"},{"status":"affected","version":"3.8.5E"},{"status":"affected","version":"3.8.5aE"},{"status":"affected","version":"3.8.6E"},{"status":"affected","version":"16.3.1"},{"status":"affected","version":"16.3.2"},{"status":"affected","version":"16.3.3"},{"status":"affected","version":"16.3.1a"},{"status":"affected","version":"16.3.4"},{"status":"affected","version":"16.3.5"},{"status":"affected","version":"16.3.5b"},{"status":"affected","version":"16.3.6"},{"status":"affected","version":"16.4.1"},{"status":"affected","version":"16.4.2"},{"status":"affected","version":"16.4.3"},{"status":"affected","version":"16.5.1"},{"status":"affected","version":"16.5.1a"},{"status":"affected","version":"16.5.1b"},{"status":"affected","version":"16.5.2"},{"status":"affected","version":"16.5.3"},{"status":"affected","version":"3.18.0aS"},{"status":"affected","version":"3.18.0S"},{"status":"affected","version":"3.18.1S"},{"status":"affected","version":"3.18.2S"},{"status":"affected","version":"3.18.3S"},{"status":"affected","version":"3.18.4S"},{"status":"affected","version":"3.18.0SP"},{"status":"affected","version":"3.18.1SP"},{"status":"affected","version":"3.18.1aSP"},{"status":"affected","version":"3.18.1gSP"},{"status":"affected","version":"3.18.1bSP"},{"status":"affected","version":"3.18.1cSP"},{"status":"affected","version":"3.18.2SP"},{"status":"affected","version":"3.18.1hSP"},{"status":"affected","version":"3.18.2aSP"},{"status":"affected","version":"3.18.1iSP"},{"status":"affected","version":"3.18.3SP"},{"status":"affected","version":"3.18.4SP"},{"status":"affected","version":"3.18.3aSP"},{"status":"affected","version":"3.18.3bSP"},{"status":"affected","version":"3.9.0E"},{"status":"affected","version":"3.9.1E"},{"status":"affected","version":"3.9.2E"},{"status":"affected","version":"3.9.2bE"},{"status":"affected","version":"16.6.1"},{"status":"affected","version":"16.6.2"},{"status":"affected","version":"16.6.3"},{"status":"affected","version":"16.7.1"},{"status":"affected","version":"16.7.1a"},{"status":"affected","version":"16.7.1b"},{"status":"affected","version":"16.7.2"},{"status":"affected","version":"16.8.1"},{"status":"affected","version":"16.8.1a"},{"status":"affected","version":"16.8.1b"},{"status":"affected","version":"16.8.1s"},{"status":"affected","version":"16.8.1c"},{"status":"affected","version":"16.8.1d"},{"status":"affected","version":"16.8.2"},{"status":"affected","version":"16.9.1b"},{"status":"affected","version":"16.9.1s"},{"status":"affected","version":"16.9.1c"},{"status":"affected","version":"3.10.0E"},{"status":"affected","version":"3.10.1E"},{"status":"affected","version":"3.10.0cE"},{"status":"affected","version":"3.10.1aE"},{"status":"affected","version":"3.10.1sE"}]}],"datePublic":"2019-03-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-295","description":"CWE-295","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-03-29T07:06:06.000Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability","tags":["vendor-advisory","x_refsource_CISCO"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert"},{"name":"107617","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/107617"}],"source":{"advisory":"cisco-sa-20190327-call-home-cert","defect":[["CSCvg83741"]],"discovery":"INTERNAL"},"title":"Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","DATE_PUBLIC":"2019-03-27T16:00:00-0700","ID":"CVE-2019-1757","STATE":"PUBLIC","TITLE":"Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Cisco IOS and IOS XE Software","version":{"version_data":[{"version_affected":"=","version_value":"3.6.4E"},{"version_affected":"=","version_value":"3.6.5E"},{"version_affected":"=","version_value":"3.6.6E"},{"version_affected":"=","version_value":"3.6.5aE"},{"version_affected":"=","version_value":"3.6.5bE"},{"version_affected":"=","version_value":"3.6.7E"},{"version_affected":"=","version_value":"3.6.8E"},{"version_affected":"=","version_value":"3.6.7aE"},{"version_affected":"=","version_value":"3.6.7bE"},{"version_affected":"=","version_value":"3.7.4E"},{"version_affected":"=","version_value":"3.7.5E"},{"version_affected":"=","version_value":"3.16.1S"},{"version_affected":"=","version_value":"3.16.1aS"},{"version_affected":"=","version_value":"3.16.2S"},{"version_affected":"=","version_value":"3.16.2aS"},{"version_affected":"=","version_value":"3.16.3S"},{"version_affected":"=","version_value":"3.16.2bS"},{"version_affected":"=","version_value":"3.16.3aS"},{"version_affected":"=","version_value":"3.16.4S"},{"version_affected":"=","version_value":"3.16.4aS"},{"version_affected":"=","version_value":"3.16.4bS"},{"version_affected":"=","version_value":"3.16.4gS"},{"version_affected":"=","version_value":"3.16.5S"},{"version_affected":"=","version_value":"3.16.4cS"},{"version_affected":"=","version_value":"3.16.4dS"},{"version_affected":"=","version_value":"3.16.4eS"},{"version_affected":"=","version_value":"3.16.6S"},{"version_affected":"=","version_value":"3.16.5aS"},{"version_affected":"=","version_value":"3.16.5bS"},{"version_affected":"=","version_value":"3.16.7S"},{"version_affected":"=","version_value":"3.16.6bS"},{"version_affected":"=","version_value":"3.16.7aS"},{"version_affected":"=","version_value":"3.16.7bS"},{"version_affected":"=","version_value":"3.17.0S"},{"version_affected":"=","version_value":"3.17.1S"},{"version_affected":"=","version_value":"3.17.2S"},{"version_affected":"=","version_value":"3.17.1aS"},{"version_affected":"=","version_value":"3.17.3S"},{"version_affected":"=","version_value":"3.17.4S"},{"version_affected":"=","version_value":"16.2.1"},{"version_affected":"=","version_value":"16.2.2"},{"version_affected":"=","version_value":"3.8.2E"},{"version_affected":"=","version_value":"3.8.3E"},{"version_affected":"=","version_value":"3.8.4E"},{"version_affected":"=","version_value":"3.8.5E"},{"version_affected":"=","version_value":"3.8.5aE"},{"version_affected":"=","version_value":"3.8.6E"},{"version_affected":"=","version_value":"16.3.1"},{"version_affected":"=","version_value":"16.3.2"},{"version_affected":"=","version_value":"16.3.3"},{"version_affected":"=","version_value":"16.3.1a"},{"version_affected":"=","version_value":"16.3.4"},{"version_affected":"=","version_value":"16.3.5"},{"version_affected":"=","version_value":"16.3.5b"},{"version_affected":"=","version_value":"16.3.6"},{"version_affected":"=","version_value":"16.4.1"},{"version_affected":"=","version_value":"16.4.2"},{"version_affected":"=","version_value":"16.4.3"},{"version_affected":"=","version_value":"16.5.1"},{"version_affected":"=","version_value":"16.5.1a"},{"version_affected":"=","version_value":"16.5.1b"},{"version_affected":"=","version_value":"16.5.2"},{"version_affected":"=","version_value":"16.5.3"},{"version_affected":"=","version_value":"3.18.0aS"},{"version_affected":"=","version_value":"3.18.0S"},{"version_affected":"=","version_value":"3.18.1S"},{"version_affected":"=","version_value":"3.18.2S"},{"version_affected":"=","version_value":"3.18.3S"},{"version_affected":"=","version_value":"3.18.4S"},{"version_affected":"=","version_value":"3.18.0SP"},{"version_affected":"=","version_value":"3.18.1SP"},{"version_affected":"=","version_value":"3.18.1aSP"},{"version_affected":"=","version_value":"3.18.1gSP"},{"version_affected":"=","version_value":"3.18.1bSP"},{"version_affected":"=","version_value":"3.18.1cSP"},{"version_affected":"=","version_value":"3.18.2SP"},{"version_affected":"=","version_value":"3.18.1hSP"},{"version_affected":"=","version_value":"3.18.2aSP"},{"version_affected":"=","version_value":"3.18.1iSP"},{"version_affected":"=","version_value":"3.18.3SP"},{"version_affected":"=","version_value":"3.18.4SP"},{"version_affected":"=","version_value":"3.18.3aSP"},{"version_affected":"=","version_value":"3.18.3bSP"},{"version_affected":"=","version_value":"3.9.0E"},{"version_affected":"=","version_value":"3.9.1E"},{"version_affected":"=","version_value":"3.9.2E"},{"version_affected":"=","version_value":"3.9.2bE"},{"version_affected":"=","version_value":"16.6.1"},{"version_affected":"=","version_value":"16.6.2"},{"version_affected":"=","version_value":"16.6.3"},{"version_affected":"=","version_value":"16.7.1"},{"version_affected":"=","version_value":"16.7.1a"},{"version_affected":"=","version_value":"16.7.1b"},{"version_affected":"=","version_value":"16.7.2"},{"version_affected":"=","version_value":"16.8.1"},{"version_affected":"=","version_value":"16.8.1a"},{"version_affected":"=","version_value":"16.8.1b"},{"version_affected":"=","version_value":"16.8.1s"},{"version_affected":"=","version_value":"16.8.1c"},{"version_affected":"=","version_value":"16.8.1d"},{"version_affected":"=","version_value":"16.8.2"},{"version_affected":"=","version_value":"16.9.1b"},{"version_affected":"=","version_value":"16.9.1s"},{"version_affected":"=","version_value":"16.9.1c"},{"version_affected":"=","version_value":"3.10.0E"},{"version_affected":"=","version_value":"3.10.1E"},{"version_affected":"=","version_value":"3.10.0cE"},{"version_affected":"=","version_value":"3.10.1aE"},{"version_affected":"=","version_value":"3.10.1sE"}]}}]},"vendor_name":"Cisco"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software."}]},"exploit":[{"lang":"en","value":""}],"impact":{"cvss":{"baseScore":"5.9","vectorString":"","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-295"}]}]},"references":{"reference_data":[{"name":"20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability","refsource":"CISCO","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert"},{"name":"107617","refsource":"BID","url":"http://www.securityfocus.com/bid/107617"}]},"source":{"advisory":"cisco-sa-20190327-call-home-cert","defect":[["CSCvg83741"]],"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T18:28:42.249Z"},"title":"CVE Program Container","references":[{"name":"20190327 Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert"},{"name":"107617","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/107617"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T15:14:56.593514Z","id":"CVE-2019-1757","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T15:15:52.387Z"}}]},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2019-1757","datePublished":"2019-03-28T00:20:21.311Z","dateReserved":"2018-12-06T00:00:00.000Z","dateUpdated":"2024-11-15T15:15:52.387Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}