Vulnerability Description
Incorrect input sanitation in text-oriented user interfaces (telnet, ssh) in Swisscom Centro Grande before 6.16.12 allows remote authenticated users to execute arbitrary commands via command injection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Swisscom | Centro Grande Firmware | < 6.14.06 |
| Swisscom | Centro Grande | - |
Related Weaknesses (CWE)
References
- https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-scExploitVendor Advisory
- https://www.swisscom.ch/en/residential/help/device/internet-router.htmlProduct
- https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-scExploitVendor Advisory
- https://www.swisscom.ch/en/residential/help/device/internet-router.htmlProduct
FAQ
What is CVE-2019-19940?
CVE-2019-19940 is a vulnerability with a CVSS score of 7.2 (HIGH). Incorrect input sanitation in text-oriented user interfaces (telnet, ssh) in Swisscom Centro Grande before 6.16.12 allows remote authenticated users to execute arbitrary commands via command injection...
How severe is CVE-2019-19940?
CVE-2019-19940 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-19940?
Check the references section above for vendor advisories and patch information. Affected products include: Swisscom Centro Grande Firmware, Swisscom Centro Grande.