First published: Wed Aug 21 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Computing System | =4.0\(1c\)hs3 | |
Cisco Integrated Management Controller Supervisor | >=2.0.0.0<2.0\(13o\) | |
Cisco Integrated Management Controller Supervisor | >=3.0.0.0<3.0\(4k\) | |
Cisco Integrated Management Controller Supervisor | >=4.0.0.0<4.0\(4b\) | |
Cisco Encs 5100 | ||
Cisco Encs 5400 | ||
Cisco Ucs-e1120d-m3 | ||
Cisco Ucs-e140s-m2 | ||
Cisco Ucs-e160d-m2 | ||
Cisco Ucs-e160s-m3 | ||
Cisco Ucs-e168d-m2 | ||
Cisco Ucs-e180d-m3 | ||
Cisco Ucs C125 M5 | ||
Cisco Ucs C4200 | ||
Cisco Ucs S3260 | ||
Cisco Integrated Management Controller Supervisor | >=4.0.0.0<4.0\(2f\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1896 is a vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) that allows an authenticated, remote attacker to inject arbitrary commands and obtain root privileges.
CVE-2019-1896 has a severity rating of 7.2, which is considered critical.
Cisco Unified Computing System 4.0(1c)hs3, Cisco Integrated Management Controller Supervisor 2.0.0.0 to 2.0(13o), 3.0.0.0 to 3.0(4k), and 4.0.0.0 to 4.0(4b) are affected by CVE-2019-1896.
Cisco has released patches to address the vulnerability. It is recommended to update to the latest available software version to mitigate the risk.
You can find more information about CVE-2019-1896 on the Cisco Security Advisory page: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896