Lucene search

K
ciscoCiscoCISCO-SA-20151201-UCS1
HistoryDec 01, 2015 - 12:00 a.m.

Cisco UCS Central Software Server-Side Request Forgery Vulnerability

2015-12-0100:00:00
tools.cisco.com
10

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

69.2%

A vulnerability in the Cisco Unified Computing System (UCS) Central software could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) on a targeted system.

The vulnerability is due to improper validation of user-supplied input on the affected system. An attacker could exploit this vulnerability by sending the user of the web application a crafted request. If processed, the attacker could gain access and perform unauthorized actions on the targeted system.

Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-ucs1[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-ucs1”]

Affected configurations

Vulners
Node
ciscounified_computing_system_central_softwareMatchany
OR
ciscounified_computing_system_central_softwareMatchany
VendorProductVersionCPE
ciscounified_computing_system_central_softwareanycpe:2.3:a:cisco:unified_computing_system_central_software:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

69.2%

Related for CISCO-SA-20151201-UCS1