Количество 3
Количество 3
CVE-2019-1937
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
GHSA-6j24-rh4h-rq7f
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
BDU:2019-03001
Уязвимость веб-интерфейса управления супервизора Cisco Integrated Management Controller (IMC) Supervisor, средства управления физической инфраструктурой и виртуальными средами Cisco UCS Director и Cisco UCS Director Express for Big Data, позволяющая нарушителю получить действительный токен сессии с привилегиями администратора в целевой системе
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-1937 A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device. | CVSS3: 9.8 | 91% Критический | больше 6 лет назад | |
GHSA-6j24-rh4h-rq7f A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device. | CVSS3: 9.8 | 91% Критический | больше 3 лет назад | |
BDU:2019-03001 Уязвимость веб-интерфейса управления супервизора Cisco Integrated Management Controller (IMC) Supervisor, средства управления физической инфраструктурой и виртуальными средами Cisco UCS Director и Cisco UCS Director Express for Big Data, позволяющая нарушителю получить действительный токен сессии с привилегиями администратора в целевой системе | CVSS3: 9.8 | 91% Критический | больше 6 лет назад |
Уязвимостей на страницу