First published: Wed Jun 19 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to access potentially sensitive system usage information. The vulnerability is due to a lack of proper data protection mechanisms. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow an attacker to view sensitive system data. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-infodisclos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190619-imc-infodisclos is classified as high due to the potential for unauthorized access to sensitive information.
To fix cisco-sa-20190619-imc-infodisclos, apply the latest security patches provided by Cisco for the Integrated Management Controller.
Organizations using Cisco Integrated Management Controller are affected by cisco-sa-20190619-imc-infodisclos.
The impact of cisco-sa-20190619-imc-infodisclos is that attackers could gain access to system usage information without authentication.
No, cisco-sa-20190619-imc-infodisclos is an unauthenticated vulnerability, allowing remote attackers to exploit it without credentials.