First published: Wed Oct 03 2018(Updated: )
A vulnerability in the web interface of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient restrictions on the size or total amount of resources allowed via the web interface. An attacker who has valid credentials for the application could exploit this vulnerability by sending a crafted or malformed HTTP request to the web interface. A successful exploit could allow the attacker to cause oversubscription of system resources or cause a component to become unresponsive, resulting in a DoS condition. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-dos
Credit: This vulnerability was found during customer acceptance testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor | ||
Cisco UCS Director |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-20181003-IMCS-UCSD-DOS is classified as high due to its potential to cause a denial of service.
To fix Cisco-SA-20181003-IMCS-UCSD-DOS, update the affected Cisco Integrated Management Controller and UCS Director to the latest software version.
The Cisco-SA-20181003-IMCS-UCSD-DOS vulnerability is caused by insufficient restrictions in the web interface of the affected products.
Organizations using Cisco Integrated Management Controller (IMC) Supervisor or Cisco UCS Director are affected by Cisco-SA-20181003-IMCS-UCSD-DOS.
No, only an authenticated remote attacker can exploit the Cisco-SA-20181003-IMCS-UCSD-DOS vulnerability.