First published: Wed Jun 19 2019(Updated: )
A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily uploaded files. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the affected device. An exploit could allow the attacker to fill up the filesystem or upload malicious scripts. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190619-imc-filewrite is classified as critical due to its potential for unauthenticated remote access and data upload capabilities.
To fix cisco-sa-20190619-imc-filewrite, apply the recommended security patches from Cisco's advisory.
The systems affected by cisco-sa-20190619-imc-filewrite include Cisco Integrated Management Controllers.
An attacker exploiting cisco-sa-20190619-imc-filewrite can upload arbitrary data to the filesystem, leading to potential data corruption or compromise.
No, authentication is not required to exploit cisco-sa-20190619-imc-filewrite, making it particularly dangerous.