First published: Wed Jun 19 2019(Updated: )
A vulnerability in the firmware signature checking program of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient checking of an input buffer. An attacker could exploit this vulnerability by passing a crafted file to the affected system. A successful exploit could inhibit an administrator's ability to access the system. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-frmwr-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco SA 20190619 IMC FRMWR DoS is categorized as high due to its potential to cause a denial of service condition.
To fix Cisco SA 20190619 IMC FRMWR DoS, ensure that you apply the latest firmware updates provided by Cisco.
Cisco Integrated Management Controllers with vulnerable firmware versions are affected by Cisco SA 20190619 IMC FRMWR DoS.
Cisco SA 20190619 IMC FRMWR DoS enables authenticated local attackers to exploit a buffer overflow, leading to a denial of service.
The Cisco SA 20190619 IMC FRMWR DoS is caused by insufficient checking of firmware signatures by the Integrated Management Controller.