Логотип exploitDog
bind:CVE-2018-15382
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-15382

Количество 3

Количество 3

nvd логотип

CVE-2018-15382

больше 7 лет назад

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-w2hw-vrcc-cpx9

больше 3 лет назад

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2019-00086

больше 7 лет назад

Уязвимость гиперконвергентной инфраструктуры Cisco HyperFlex, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю создать действительные подписанные токены сеанса и повысить свои привилегии

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-15382

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.

CVSS3: 8.6
1%
Низкий
больше 7 лет назад
github логотип
GHSA-w2hw-vrcc-cpx9

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.

CVSS3: 8.6
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00086

Уязвимость гиперконвергентной инфраструктуры Cisco HyperFlex, связанная с небезопасным внешним контролем за критическими данными состояния, позволяющая нарушителю создать действительные подписанные токены сеанса и повысить свои привилегии

CVSS3: 8.6
1%
Низкий
больше 7 лет назад

Уязвимостей на страницу