You are here
Home > Preporuke > Ranjivost Cisco Elastic Services Controller softvera

Ranjivost Cisco Elastic Services Controller softvera

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Elastic Services Controller REST API Authentication Bypass Vulnerability

Advisory ID: cisco-sa-20190507-esc-authbypass

Revision: 1.0

For Public Release: 2019 May 7 16:00 GMT

Last Updated: 2019 May 7 16:00 GMT

CVE ID(s): CVE-2019-1867

CVSS Score v(3): 10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API.

The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass”]

—–BEGIN PGP SIGNATURE—–
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=mcxm
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa rhvm-setup-plugins

Otkriven je sigurnosni nedostatak u programskom paketu rhvm-setup-plugins za Red Hat Virtualization Engine 4.3. Otkriveni nedostatak napadaču s ovlastima pristupa...

Close