First published: Wed Sep 23 2020(Updated: )
A vulnerability in the firmware of the Cisco UCS C-Series Rack Servers could allow an authenticated, physical attacker to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot validation checks and load a compromised software image on an affected device. The vulnerability is due to improper validation of the server firmware upgrade images. An attacker could exploit this vulnerability by installing a server firmware version that would allow the attacker to disable UEFI Secure Boot. A successful exploit could allow the attacker to bypass the signature validation checks that are done by UEFI Secure Boot technology and load a compromised software image on the affected device. A compromised software image is any software image that has not been digitally signed by Cisco.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco Fmc1000-k9 Bios | <4.0.1f.0 | |
Cisco Fmc1000-k9 Firmware | <4.0.2h | |
All of | ||
Cisco Fmc2500-k9 Bios | <4.0.1f.0 | |
Cisco Fmc2500-k9 Firmware | <4.0.2h | |
All of | ||
Cisco Fmc4500-k9 Bios | <4.0.1f.0 | |
Cisco Fmc4500-k9 Firmware | <4.0.2h | |
All of | ||
Cisco Sns-3515-k9 Bios | <4.0.2d | |
Cisco Sns-3515-k9 Firmware | <4.0.2h | |
All of | ||
Cisco Sns-3595-k9 Bios | <4.0.2d | |
Cisco Sns-3595-k9 Firmware | <4.0.2h | |
All of | ||
Cisco Sns-3615-k9 Bios | <4.0.1i | |
Cisco Sns-3615-k9 Firmware | <4.0.1g | |
All of | ||
Cisco Sns-3655-k9 Bios | <4.0.1i | |
Cisco Sns-3655-k9 Firmware | <4.0.1g | |
All of | ||
Cisco Sns-3695-k9 Bios | <4.0.1i | |
Cisco Sns-3695-k9 Firmware | <4.0.1g | |
All of | ||
Cisco Tg5004-k9 Bios | <4.0.2d | |
Cisco Tg5004-k9 Firmware | <4.0.2h | |
All of | ||
Cisco Tg5004-k9-rf Bios | <4.0.2d | |
Cisco Tg5004-k9-rf Firmware | <4.0.2h | |
Cisco Identity Services Engine | =2.4\(0.357\) | |
Cisco Identity Services Engine | =2.6\(0.156\) | |
Cisco Unified Computing System | =3.2\(3h\)c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1736 is a vulnerability in the firmware of the Cisco UCS C-Series Rack Servers that allows an authenticated, physical attacker to bypass UEFI Secure Boot validation checks and load a compromised software image on an affected device.
An attacker can exploit CVE-2019-1736 by physically accessing the Cisco UCS C-Series Rack Server and bypassing the UEFI Secure Boot validation checks.
The severity of CVE-2019-1736 is medium, with a CVSS score of 6.6.
Cisco UCS C-Series Rack Servers, Cisco Identity Services Engine, and Cisco Unified Computing System are affected by CVE-2019-1736.
To fix CVE-2019-1736, Cisco recommends upgrading to the appropriate fixed version of the firmware or software.