First published: Sun Jan 26 2020(Updated: )
A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to download system log files from an affected device. The vulnerability is due to an issue in the authentication logic of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web interface. A successful exploit could allow the attacker to download log files if they were previously generated by an administrator.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director | <6.7.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16003 is a vulnerability in the web-based management interface of Cisco UCS Director that allows an unauthenticated attacker to download system log files from an affected device.
CVE-2019-16003 has a severity rating of 5.3, which is considered medium.
The affected software version of CVE-2019-16003 is Cisco UCS Director up to version 6.7.3.1.
An attacker can exploit CVE-2019-16003 by leveraging an issue in the authentication logic of the web-based management interface to download system log files.
You can find more information about CVE-2019-16003 at the following reference link: <a href='https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-ucs-dir-infodis'>Cisco Security Advisory - Cisco-SA-20200108-UCS-DIR-INFO-DIS</a>.