A vulnerability in the web interface for specific feature sets of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to access sensitive information. The vulnerability is due to an authorization check that does not properly include the access level of the web interface user. An attacker who has valid application credentials could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to view sensitive information that belongs to other users. The attacker could then use this information to conduct additional reconnaissance attacks.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041779 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-id | Vendor Advisory |
http://www.securitytracker.com/id/1041779 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-id | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1041779 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-imcs-ucsd-id - Vendor Advisory |
Information
Published : 2018-10-05 14:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-15405
Mitre link : CVE-2018-15405
CVE.ORG link : CVE-2018-15405
JSON object : View
Products Affected
cisco
- ucs_director