A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105518 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-secret | Vendor Advisory |
http://www.securityfocus.com/bid/105518 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-secret | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105518 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-secret - Vendor Advisory |
Information
Published : 2018-10-05 14:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-15382
Mitre link : CVE-2018-15382
CVE.ORG link : CVE-2018-15382
JSON object : View
Products Affected
cisco
- hyperflex_hx_data_platform
CWE
CWE-642
External Control of Critical State Data