First published: Wed Aug 21 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
Credit: Fatih Sencer ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor | >=2.2.0.3<=2.2.0.6 | |
Cisco UCS Director | >=6.6.0.0<=6.6.1.0 | |
Cisco UCS Director | >=6.7.0.0<=6.7.1.0 | |
Cisco UCS Director | =6.7\(0.0.67265\) | |
Cisco UCS Director Express for Big Data | >=3.7.0.0<=3.7.1.0 | |
Cisco UCS Director Express for Big Data | =3.6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1937 is a vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data.
CVE-2019-1937 has a severity rating of 9.8 (Critical).
CVE-2019-1937 allows an unauthenticated, remote attacker to acquire a valid session token with administrator privileges in Cisco Integrated Management Controller Supervisor.
CVE-2019-1937 allows an unauthenticated, remote attacker to acquire a valid session token with administrator privileges in Cisco UCS Director.
To fix CVE-2019-1937, Cisco recommends updating to the appropriate fixed version mentioned in the Cisco Security Advisory.