A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
The vulnerability is due to a missing authentication check in an API call. An attacker who can send a request to an affected system could cause all currently authenticated users to be logged off. Repeated exploitation could cause the inability to maintain a session in the web-based management portal.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-imc-dos [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-imc-dos”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | ucs_director | any | cpe:2.3:a:cisco:ucs_director:any:*:*:*:*:*:*:* |
cisco | integrated_management_controller_supervisor | any | cpe:2.3:a:cisco:integrated_management_controller_supervisor:any:*:*:*:*:*:*:* |
cisco | unified_computing_system_director | any | cpe:2.3:a:cisco:unified_computing_system_director:any:*:*:*:*:*:*:* |