First published: Thu Jun 20 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user to follow a malicious link. A successful exploit could allow the attacker to use a web browser and the privileges of the user to perform arbitrary actions on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller | ||
Cisco Unified Computing System | =4.0\(1c\)hs3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1632 is a vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) that allows an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.
CVE-2019-1632 has a severity rating of high with a score of 8 out of 10.
CVE-2019-1632 affects Cisco Integrated Management Controller and Cisco Unified Computing System 4.0(1c)hs3.
The vulnerability in CVE-2019-1632 can be exploited by an authenticated, remote attacker through a cross-site request forgery (CSRF) attack.
Yes, you can find more information about CVE-2019-1632 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/108858) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-csrf).