CVE-2018-15382

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.
Configurations

Configuration 1 (hide)

cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\(1a\):*:*:*:*:*:*:*

History

21 Nov 2024, 03:50

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/105518 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105518 - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-secret - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-secret - Vendor Advisory

Information

Published : 2018-10-05 14:29

Updated : 2024-11-21 03:50


NVD link : CVE-2018-15382

Mitre link : CVE-2018-15382

CVE.ORG link : CVE-2018-15382


JSON object : View

Products Affected

cisco

  • hyperflex_hx_data_platform
CWE
CWE-642

External Control of Critical State Data