Platform
cisco
Component
cisco-vision-dynamic-signage-director
Fixed in
6.1sp3
CVE-2019-1917 describes an authentication bypass vulnerability affecting Cisco Vision Dynamic Signage Director versions up to 6.1sp3. This flaw allows an unauthenticated, remote attacker to bypass authentication and potentially gain administrative control over the system. The vulnerability stems from insufficient validation of HTTP requests within the REST API interface, and a patch is available in version 6.1sp3.
The impact of CVE-2019-1917 is severe. A successful exploit allows an attacker to execute arbitrary actions with administrative privileges on the affected Cisco Vision Dynamic Signage Director system. This could include modifying system configurations, accessing sensitive data, or even taking complete control of the device. Given the administrative privileges granted, an attacker could potentially pivot to other systems on the network, leading to a broader compromise. The REST API is enabled by default, increasing the attack surface and making exploitation easier.
CVE-2019-1917 was publicly disclosed on July 17, 2019. While no active exploitation campaigns have been definitively linked to this CVE, the CRITICAL severity and ease of exploitation make it a potential target. It is not currently listed on CISA KEV. Public proof-of-concept exploits are available, demonstrating the feasibility of bypassing authentication and gaining administrative access.
Exploit Status
EPSS
14.37% (94% percentile)
CVSS Vector
The primary mitigation for CVE-2019-1917 is to upgrade Cisco Vision Dynamic Signage Director to version 6.1sp3 or later. If immediate upgrade is not possible, consider implementing strict network segmentation to isolate the affected system. Review and restrict access to the REST API, limiting it to trusted sources. Monitor REST API traffic for suspicious activity. While no specific WAF rules are provided, generic rules to block unauthorized access attempts to the REST API endpoints could offer some protection. After upgrade, confirm functionality by verifying administrative access and ensuring the REST API operates as expected.
Actualice Cisco Vision Dynamic Signage Director a la versión 6.1sp3 o posterior. Esta actualización corrige la vulnerabilidad de omisión de autenticación en la API REST.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2019-1917 is a critical vulnerability in Cisco Vision Dynamic Signage Director (versions ≤6.1sp3) that allows an unauthenticated attacker to bypass authentication and gain administrative privileges.
You are affected if you are running Cisco Vision Dynamic Signage Director versions prior to 6.1sp3 and have not applied the security patch.
Upgrade Cisco Vision Dynamic Signage Director to version 6.1sp3 or later to mitigate the vulnerability. If immediate upgrade is not possible, implement network segmentation and restrict REST API access.
While no confirmed active exploitation campaigns are publicly known, the vulnerability's severity and ease of exploitation make it a potential target.
Refer to the official Cisco Security Advisory for CVE-2019-1917: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vision-auth-bypass-190717
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.