A vulnerability in the Stealthwatch Management Console (SMC) of Cisco Stealthwatch Enterprise could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected system. The vulnerability is due to an insecure system configuration. An attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted application. An exploit could allow the attacker to gain unauthenticated access, resulting in elevated privileges in the SMC.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105853 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-smc-auth-bypass | Vendor Advisory |
http://www.securityfocus.com/bid/105853 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-smc-auth-bypass | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105853 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-smc-auth-bypass - Vendor Advisory |
Information
Published : 2018-11-08 17:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-15394
Mitre link : CVE-2018-15394
CVE.ORG link : CVE-2018-15394
JSON object : View
Products Affected
cisco
- stealthwatch_enterprise
CWE