First published: Mon Nov 18 2024(Updated: )
A vulnerability in Cisco Integrated Management Controller could allow an unauthenticated, remote attacker to enumerate valid usernames within the vulnerable application. The vulnerability is due to differences in authentication responses sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to the affected application. A successful exploit could allow the attacker to confirm the names of administrative user accounts for use in further attacks.There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26062 is rated as a medium severity vulnerability due to its potential for username enumeration.
CVE-2020-26062 allows an unauthenticated, remote attacker to enumerate valid usernames in Cisco Integrated Management Controller.
Yes, CVE-2020-26062 can be exploited remotely without authentication.
CVE-2020-26062 affects various versions of Cisco Integrated Management Controller, but specific versions are not listed.
To mitigate CVE-2020-26062, apply the latest security updates from Cisco for the Integrated Management Controller.