A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
2019-08-21T19:15:15.403
2024-11-21T04:37:43.487
Modified
CVSSv3.0: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | integrated_management_controller_supervisor | ≤ 2.2.0.6 | Yes |
Application | cisco | ucs_director | ≤ 6.6.1.0 | Yes |
Application | cisco | ucs_director | ≤ 6.7.1.0 | Yes |
Application | cisco | ucs_director | 6.7\(0.0.67265\) | Yes |
Application | cisco | ucs_director_express_for_big_data | ≤ 3.7.1.0 | Yes |
Application | cisco | ucs_director_express_for_big_data | 3.6.0.0 | Yes |