A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 04:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/108680 - | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass - Vendor Advisory |
Information
Published : 2019-06-05 17:29
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1880
Mitre link : CVE-2019-1880
CVE.ORG link : CVE-2019-1880
JSON object : View
Products Affected
cisco
- unified_computing_system_c240_m5
- unified_computing_system_c220_m4
- unified_computing_system_c125_m5
- unified_computing_system_c480_m5
- unified_computing_system_c460_m4
- unified_computing_system_server_firmware
- unified_computing_system_c220_m5
- unified_computing_system_c240_m4
CWE
CWE-345
Insufficient Verification of Data Authenticity