Количество 3
Количество 3
CVE-2018-15382
A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.
GHSA-w2hw-vrcc-cpx9
A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.
BDU:2019-00086
Уязвимость гиперконвергентной инфраструктуры Cisco HyperFlex, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю создать действительные подписанные токены сеанса и повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-15382 A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized. | CVSS3: 8.6 | 1% Низкий | больше 7 лет назад | |
GHSA-w2hw-vrcc-cpx9 A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized. | CVSS3: 8.6 | 1% Низкий | больше 3 лет назад | |
BDU:2019-00086 Уязвимость гиперконвергентной инфраструктуры Cisco HyperFlex, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю создать действительные подписанные токены сеанса и повысить свои привилегии | CVSS3: 8.6 | 1% Низкий | больше 7 лет назад |
Уязвимостей на страницу