Improper input validation in Enterprise NFV Infrastructure Software - CVE-2019-1656
Published: January 23, 2019 / Updated: January 24, 2019
Enterprise NFV Infrastructure Software
Detailed vulnerability description
The vulnerability allows a local attacker to bypass security restrictions.
The vulnerability exists due to improper input validation. A local attacker can send specially crafted commands and gain shell access with a non-root user account to the underlying Linux operating system on the affected device and potentially access system configuration files with sensitive information.