A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to set sensitive configuration values and gain elevated privileges. The vulnerability is due to improper handling of substring comparison operations that are performed by the affected software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker with read-only privileges to gain administrator privileges.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privescal - Vendor Advisory |
Information
Published : 2019-08-21 19:15
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1907
Mitre link : CVE-2019-1907
CVE.ORG link : CVE-2019-1907
JSON object : View
Products Affected
cisco
- integrated_management_controller_supervisor
- unified_computing_system
- ucs_c125_m5
- ucs_s3260
- ucs_c4200
CWE