{"id": "CVE-2021-1397", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 4.7, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2021-05-06T13:15:09.950", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imc-openred-zAYrU6d2", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imc-openred-zAYrU6d2", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-601"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability is known as an open redirect attack, which is used in phishing attacks to get users to visit malicious sites without their knowledge."}, {"lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco Integrated Management Controller (IMC), podr\u00eda permitir a un atacante remoto no autenticado redirija a un usuario a una p\u00e1gina web maliciosa. Esta vulnerabilidad es debido a una comprobaci\u00f3n inapropiada de la entrada de los par\u00e1metros en una petici\u00f3n HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad al persuadir a un usuario para que haga clic en un v\u00ednculo dise\u00f1ado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante redirigir a un usuario a un sitio web malicioso. Esta vulnerabilidad es conocida como un ataque de redireccionamiento abierto, que es usado en ataques de phishing para que los usuarios visiten sitios maliciosos sin su conocimiento"}], "lastModified": "2024-11-21T05:44:15.633", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8804FC02-F5DC-467F-AC53-C9E968537E98", "versionEndExcluding": "3.2\\(12.4\\)"}, {"criteria": "cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA1B9BD7-4050-4F99-9412-F3E673FED790", "versionEndIncluding": "4.1\\(3b\\)"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:encs_5100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CF04641-9D9A-4FFC-B3AA-A8A4042EB2C9", "versionEndIncluding": "4.4.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "678F3A32-372A-441E-8115-95181FBAF628"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:encs_5400_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "247817B4-D34D-4ED5-8236-E7C36542538C", "versionEndIncluding": "4.4.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "01AE8153-6C23-46AB-BEAA-A6F27FDFEED7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c220_m6_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB0B1A7-87BD-4594-8F8C-D89E0DF460EC", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c220_m6:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "297A607F-E8CE-4943-BA92-B53585BA683E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c225_m6_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3E0DB28-6093-40BE-BD71-9E9A35F4C107", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c225_m6:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3346CA68-1977-429F-BEF6-7CD165298852"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c240_m6_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D90D18EE-2EC0-4C14-A679-6542ACBC81E6", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c240_m6:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7301A230-B65F-40FB-A4D0-6D9D9B65F4E3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c245_m6_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1216C5A1-F429-40E9-B0E1-8ED45ED81B48", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c245_m6:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "33A05B60-6E96-4DF8-A607-CC712D0D0A9E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c125_m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4929AAEB-E6BF-43EB-8C0A-64B4ED82A3B7", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c125_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "773F05F8-CF38-4CC8-9FC8-528789073FB2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c220_m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC1BE6F7-B0D0-4224-BB37-E024F2C9715F", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c220_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CB5FBE2F-1920-48DC-8377-A4AD8202C123"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c240_m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E9CCA0-1128-48FF-8C97-EF1139C9438E", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c240_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F4570063-4744-4CF0-AC99-14693E639191"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c480_m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBB8527A-86C1-4413-AC52-3CB7D72FE120", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c480_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5717A4D4-9CBB-4A7B-A974-76CABB54B2E4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:c480_ml_m5_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "533C38A4-64FF-42CA-9649-2FAE80D12CED", "versionEndIncluding": "4.1\\(2f\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c480_ml_m5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CFB191A5-B7D8-49C3-9CE9-F5CBD506D4C8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e140s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "727956AA-0627-46B7-8394-E8A218E2A84D", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e140s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0FEC2FF1-D0AB-49B1-AB28-D912384F5540"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e140d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E10DD81-5526-4C8A-841F-2561740A0457", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e140d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CD7BA377-87BD-4330-9A69-0356A4AEE457"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e160d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47BEB922-330E-4A84-8079-0AD69E0D25D7", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e160d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "02A9C58E-5148-4671-BA3A-3A7216EC421B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e160s-m3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05C2C217-1A58-44CF-8934-05A27DA3650C", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0E6AAD9-824C-4126-8347-2FF1895E6D33"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e180d-m3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA106E3B-870C-442A-AB69-E749196E6A57", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "155D990F-C7DA-48DD-92CC-18542DBBE572"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e1120d-m3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13F12356-BDF4-4EE0-8E85-532BD826D67E", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DF77273F-73C0-40EB-BB4E-75269D46F074"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e140s-m2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE53EC1B-A239-41BD-A2F6-76F499EA3397", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "757958F5-F58C-4128-B128-D989A56ACA34"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e160d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47BEB922-330E-4A84-8079-0AD69E0D25D7", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e160d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "02A9C58E-5148-4671-BA3A-3A7216EC421B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e180d-m2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5F0CBEF-1CA7-49D8-B7E2-5EDD2B3FB925", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e180d-m2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BB3E47EB-9C60-4A06-956A-46B5D2E46239"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e140s-m1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D49F74E-A2BD-4C55-A236-AEB3E479416D", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e140s-m1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "94805A53-CCA0-4737-939F-1157F557770C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e140d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E10DD81-5526-4C8A-841F-2561740A0457", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e140d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CD7BA377-87BD-4330-9A69-0356A4AEE457"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e140dp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF97AF37-C12A-452F-AD50-581CD5122BBA", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e140dp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CE387668-61D1-459D-9871-C23252EF67D2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e160d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47BEB922-330E-4A84-8079-0AD69E0D25D7", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e160d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "02A9C58E-5148-4671-BA3A-3A7216EC421B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs-e160dp-m1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FDCFE0D-CAF5-4520-AE7B-25F0B66BD7FD", "versionEndIncluding": "3.2\\(11.5\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs-e160dp-m1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67C1D42D-CEFF-4B66-B211-DAEA94D21F6D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ucs_s3260_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF6CC866-6832-4F8F-B0B3-6D1A09E2F89B", "versionEndIncluding": "4.0\\(2o\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2FDC8A69-0914-44C1-8AEA-262E0A285C81"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}