First published: Fri Oct 05 2018(Updated: )
A vulnerability in the web interface for specific feature sets of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to access sensitive information. The vulnerability is due to an authorization check that does not properly include the access level of the web interface user. An attacker who has valid application credentials could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to view sensitive information that belongs to other users. The attacker could then use this information to conduct additional reconnaissance attacks.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director | =2.1\(0.0\) | |
Cisco UCS Director | =6.6\(1.0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15405 is a vulnerability in the web interface for specific feature sets of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director that allows an authenticated, remote attacker to access sensitive information.
CVE-2018-15405 has a severity rating of 6.5 out of 10, making it a medium severity vulnerability.
Cisco UCS Director versions 2.1(0.0) and 6.6(1.0) are affected by CVE-2018-15405.
An attacker can exploit CVE-2018-15405 by leveraging an authorization check vulnerability in the web interface to gain unauthorized access to sensitive information.
Yes, you can find references for CVE-2018-15405 at the following links: [SecurityTracker](http://www.securitytracker.com/id/1041779) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-id).