First published: Fri Apr 07 2017(Updated: )
A vulnerability in the web interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability affects the following Cisco products running Cisco IMC Software: Unified Computing System (UCS) B-Series M3 and M4 Blade Servers, Unified Computing System (UCS) C-Series M3 and M4 Rack Servers. More Information: CSCvc37931. Known Affected Releases: 3.1(2c)B.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Computing System software | =2.2\(8b\) | |
Cisco Unified Computing System software | =3.0\(1c\) | |
Cisco Unified Computing System software | =3.1\(2c\)b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6604 has been rated as having a high severity due to its potential for remote exploitation without authentication.
To mitigate CVE-2017-6604, it is recommended to upgrade to the latest version of Cisco IMC Software that addresses this vulnerability.
CVE-2017-6604 affects various versions of the Cisco Unified Computing System software, specifically 2.2(8b), 3.0(1c), and 3.1(2c)b.
Yes, CVE-2017-6604 can be exploited by an unauthenticated remote attacker.
The exploitation of CVE-2017-6604 could allow an attacker to redirect users to malicious web pages, leading to further security risks.