First published: Wed Oct 03 2018(Updated: )
A vulnerability in the web interface for specific feature sets of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to access sensitive information. The vulnerability is due to an authorization check that does not properly include the access level of the web interface user. An attacker who has valid application credentials could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to view sensitive information that belongs to other users. The attacker could then use this information to conduct additional reconnaissance attacks. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-id
Credit: This vulnerability was found during customer acceptance testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor | ||
Cisco UCS Director |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-20181003-IMCS-UCSD-ID is considered high due to the potential for unauthorized access to sensitive information.
To fix Cisco-SA-20181003-IMCS-UCSD-ID, upgrade to the latest version of Cisco Integrated Management Controller or Cisco UCS Director as recommended by Cisco.
Cisco-SA-20181003-IMCS-UCSD-ID affects users of Cisco Integrated Management Controller Supervisor and Cisco UCS Director with specific feature sets.
The vulnerability Cisco-SA-20181003-IMCS-UCSD-ID is caused by insufficient authorization checks in the web interface.
Yes, an authenticated remote attacker can exploit Cisco-SA-20181003-IMCS-UCSD-ID to access sensitive information.