First published: Wed Sep 23 2020(Updated: )
A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Vision Dynamic Signage Director | <6.2.0 | |
Cisco Vision Dynamic Signage Director | =6.2.0 | |
Cisco Vision Dynamic Signage Director | =6.2.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16004 is a vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director that could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
The severity of CVE-2019-16004 is medium with a CVSS score of 6.5.
An attacker can exploit CVE-2019-16004 by leveraging missing authentication on some of the API calls to bypass authentication on the affected device.
Cisco Vision Dynamic Signage Director versions up to and including 6.2.0 and 6.2.0-sp1 are affected by CVE-2019-16004.
To fix CVE-2019-16004, users should update to a version of Cisco Vision Dynamic Signage Director that is not affected by the vulnerability.