First published: Fri May 10 2019(Updated: )
A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API. The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Elastic Services Controller | >=4.1<4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1867 is classified as a high severity vulnerability due to its potential to allow unauthorized access to the REST API.
To fix CVE-2019-1867, update the Cisco Elastic Services Controller to a version later than 4.5.
CVE-2019-1867 exploits improper validation of API requests in the REST API of Cisco Elastic Services Controller.
CVE-2019-1867 affects Cisco Elastic Services Controller versions 4.1 to 4.5.
Yes, CVE-2019-1867 can be exploited by an unauthenticated remote attacker.