A vulnerability in the certificate registration process of Cisco Unified Computing System (UCS) Central Software could allow an authenticated, adjacent attacker to register a rogue Cisco Unified Computing System Manager (UCSM). This vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to the registration API. A successful exploit could allow the attacker to register a rogue Cisco UCSM and gain access to Cisco UCS Central Software data and Cisco UCSM inventory data.
2021-02-04T17:15:18.763
2024-11-21T05:44:09.857
Modified
CVSSv3.1: 4.3 (MEDIUM)
AV:A/AC:L/Au:S/C:P/I:N/A:N
5.1
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | unified_computing_system_central_software | < 2.0\(1m\) | Yes |