CVE-2019-16004

A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:vision_dynamic_signage_director:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:vision_dynamic_signage_director:6.2.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:vision_dynamic_signage_director:6.2.0:sp1:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-vdsd-auth-bypass - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-vdsd-auth-bypass - Vendor Advisory

Information

Published : 2020-09-23 01:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-16004

Mitre link : CVE-2019-16004

CVE.ORG link : CVE-2019-16004


JSON object : View

Products Affected

cisco

  • vision_dynamic_signage_director
CWE
CWE-306

Missing Authentication for Critical Function