First published: Wed Jun 19 2019(Updated: )
A vulnerability in the Server Utilities of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to gain unauthorized access to sensitive user information from the configuration data that is stored on the affected system. The vulnerability is due to insufficient protection of data in the configuration file. An attacker could exploit this vulnerability by downloading the configuration file. An exploit could allow the attacker to use the sensitive information from the file to elevate privileges. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-infodiscl
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190619-imc-infodiscl is rated as high due to the potential unauthorized access to sensitive information.
To fix cisco-sa-20190619-imc-infodiscl, update the Cisco Integrated Management Controller to the latest version provided by Cisco.
Authenticated remote attackers can exploit cisco-sa-20190619-imc-infodiscl to access sensitive configuration data.
Organizations using vulnerable versions of the Cisco Integrated Management Controller are affected by cisco-sa-20190619-imc-infodiscl.
The potential impact of cisco-sa-20190619-imc-infodiscl includes unauthorized access to sensitive user information.