CVE-2019-1867

A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API. The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:elastic_services_controller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:37

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass - Vendor Advisory

Information

Published : 2019-05-10 12:29

Updated : 2024-11-21 04:37


NVD link : CVE-2019-1867

Mitre link : CVE-2019-1867

CVE.ORG link : CVE-2019-1867


JSON object : View

Products Affected

cisco

  • elastic_services_controller
CWE
CWE-287

Improper Authentication