First published: Fri Oct 05 2018(Updated: )
A vulnerability in the REST API of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to read any file on an affected system. The vulnerability is due to insufficient authorization and parameter validation checks. An attacker could exploit this vulnerability by sending a malicious API request with the authentication credentials of a low-privileged user. A successful exploit could allow the attacker to read any file on the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Enterprise Network Functions Virtualization Infrastructure Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0460 has a high severity rating due to its potential to allow remote attackers to access sensitive files.
CVE-2018-0460 affects Cisco Enterprise Network Functions Virtualization Infrastructure Software.
To fix CVE-2018-0460, apply the latest security patches provided by Cisco for the affected software.
An attacker exploiting CVE-2018-0460 could read any file on the affected system, leading to potential data exposure.
Yes, an authenticated user is required to exploit CVE-2018-0460, as the vulnerability is due to insufficient authorization checks.