First published: Fri Oct 05 2018(Updated: )
A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco HyperFlex HX Data Platform | =3.0\(1a\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15382 is a vulnerability in Cisco HyperFlex Software that allows an unauthenticated remote attacker to generate valid, signed session tokens.
The vulnerability occurs due to a static signing key that is present in all Cisco HyperFlex systems.
CVE-2018-15382 has a severity rating of 8.6, which is considered high.
Cisco HyperFlex HX Data Platform version 3.0(1a) is affected by CVE-2018-15382.
To fix CVE-2018-15382, Cisco has released security updates. Please refer to the vendor's advisory for more information.