{"id": "CVE-2019-1857", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2019-05-03T17:29:01.437", "references": [{"url": "http://www.securityfocus.com/bid/108163", "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "http://www.securityfocus.com/bid/108163", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-352"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system by using a web browser and with the privileges of the user."}, {"lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en la web de HyperFlex HX-Series de Cisco, podr\u00eda permitir a un atacante remoto no identificado dirija un ataque de tipo cross-site request forgery (CSRF) y ejecute acciones arbitrarias en un sistema afectado. La vulnerabilidad es debido a las insuficientes protecciones de CSRF para la interfaz de administraci\u00f3n basada en web del programa afectado. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que siga un enlace creado. Una operaci\u00f3n \u00e9xito podr\u00eda permitir al atacante realizar acciones arbitrarias en un sistema afectado mediante el uso de un navegador web y con privilegios del usuario."}], "lastModified": "2024-11-21T04:37:32.597", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:hx220c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5C198A0-34DF-4237-9579-1395B05B9352"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:hx220c_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FB126C9A-C926-436F-94AB-E7A4BA8EC8F5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:hx240c_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D33F42D5-0B40-4D5D-ABFB-D2024D6659C4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:hx240c_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D96602B4-C017-4480-976E-38B9A7BB9B47"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:hx240c_large_form_factor_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0B0B68A-40FF-4436-A206-81039E476FA4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:hx240c_large_form_factor:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1E4B8B57-386B-461B-92C5-859298C5CE76"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:hx220c_all_nvme_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3431062-82CE-4E1B-A1BA-7EC439B9DD7F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:hx220c_all_nvme_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC0DE157-7B81-4F8E-9F75-4324F7F64357"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:hx220c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58156CE8-E695-49B4-98F7-1603F905AB57"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:hx220c_af_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "224D5BE6-AC77-41B4-9533-8413DC060821"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:hx240c_af_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "760C8584-51F8-4A9A-9A9E-504EA14C091C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:hx240c_af_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1CA7BE5B-90E9-4B86-B0B7-A265C94FB9BE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:hx220c_edge_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81D3B26E-428E-4EA8-B3CB-C46EF784C730"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:hx220c_edge_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "61B08E59-8B5B-4D03-A4D0-6180D64C9967"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_b200_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB2303C3-1AC3-4934-A622-E36CE82C17AC"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_b200_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C51F9FBE-4ACC-4979-B8EE-8CABC65D5477"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_b480_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06F57EE6-4F72-4412-96D2-4841DEE6B8FA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_b480_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "989ABDEE-49FC-4CD7-82AA-2CCB53942C2C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_c480_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD062D9B-D02A-4012-A0F3-DDDBD3AB9947"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_c480_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D0B0FA5-996F-4F25-8AAB-603CB46175F9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_c125_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3CFA537-40C6-47C6-916E-62CCE609670F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ADD4A429-F168-460B-A964-8F1BD94C6387"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_c220_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE5DEFA9-4D1D-4469-84D0-FA694568F3D6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_c220_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "855E1346-BACC-4485-9534-7C830FCFD54B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_c240_m5_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "242959AB-0566-443A-A065-F64D42A6207F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_c240_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F262ADAB-74DC-466B-983A-C49E4BAC22C0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_c480_ml_firmware:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38E05AD1-38AC-44B2-B7AD-45E86B66CCDF"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_c480_ml:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2A3FFE02-A5A8-4F0F-87C5-F7651F511074"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}