CVE-2019-19256

Current Description

Tellabs Optical Line Terminal (OLT) 1150 devices allow Remote Command Execution via the -l option to TELNET or SSH. Tellabs has addressed this issue in the SR30.1 and SR31.1 release on February 18, 2020.

Basic Data

PublishedMarch 20, 2020
Last ModifiedApril 03, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-287
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSTellabsOptical Line Terminal 1150 Firmwareont709.2.50.12*******
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareTellabsOptical Line Terminal 1150fp29.2_015873*******

Vulnerable Software List

VendorProductVersions
Tellabs Optical Line Terminal 1150 Firmware ont709.2.50.12

References

NameSourceURLTags
https://docs.tellabs.com/articles/#!vulnerability-response/cve-2019-19148https://docs.tellabs.com/articles/#!vulnerability-response/cve-2019-19148CONFIRM
https://github.com/ellwoodthewood/tellabs_rcehttps://github.com/ellwoodthewood/tellabs_rceMISCExploit Third Party Advisory