CVE-2019-16003

A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to download system log files from an affected device. The vulnerability is due to an issue in the authentication logic of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web interface. A successful exploit could allow the attacker to download log files if they were previously generated by an administrator.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-ucs-dir-infodisĀ - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-ucs-dir-infodisĀ - Vendor Advisory

Information

Published : 2020-01-26 05:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-16003

Mitre link : CVE-2019-16003

CVE.ORG link : CVE-2019-16003


JSON object : View

Products Affected

cisco

  • ucs_director
CWE
CWE-306

Missing Authentication for Critical Function