First published: Thu Jun 20 2019(Updated: )
A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily uploaded files. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the affected device. An exploit could allow the attacker to fill up the filesystem or upload malicious scripts.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller | ||
Cisco Unified Computing System | =4.0\(1c\)hs3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-1629.
CVE-2019-1629 has a severity rating of 5.3, which is considered medium.
The affected software for CVE-2019-1629 is Cisco Integrated Management Controller and Cisco Unified Computing System version 4.0(1c)hs3.
CVE-2019-1629 allows an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem.
Yes, there are security advisories and references available for CVE-2019-1629. You can refer to the following links for more information: [http://www.securityfocus.com/bid/108852](http://www.securityfocus.com/bid/108852) and [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite).