Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-1850
Modified
More InfoOfficial Page
Source-ykramarz@cisco.com
View Known Exploited Vulnerability (KEV) details
Published At-21 Aug, 2019 | 19:15
Updated At-09 Oct, 2019 | 23:48

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. An attacker would need to have valid administrator credentials on the device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker with elevated privileges could exploit this vulnerability by sending crafted commands to the administrative web management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.2HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.07.2HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.09.0HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>unified_computing_system>>4.0\(1c\)hs3
cpe:2.3:a:cisco:unified_computing_system:4.0\(1c\)hs3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>integrated_management_controller_supervisor>>Versions from 3.0.0.0(inclusive) to 3.0\(4k\)(exclusive)
cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>integrated_management_controller_supervisor>>Versions from 4.0.0.0(inclusive) to 4.0\(4b\)(exclusive)
cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>encs_5100>>-
cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>encs_5400>>-
cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e1120d-m3>>-
cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e140s-m2>>-
cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e160d-m2>>-
cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e160s-m3>>-
cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e168d-m2>>-
cpe:2.3:h:cisco:ucs-e168d-m2:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e180d-m3>>-
cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs_c125_m5>>-
cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs_c4200>>-
cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs_s3260>>-
cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>integrated_management_controller_supervisor>>Versions from 4.0.0.0(inclusive) to 4.0\(2f\)(exclusive)
cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>encs_5100>>-
cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>encs_5400>>-
cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e1120d-m3>>-
cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e140s-m2>>-
cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e160d-m2>>-
cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e160s-m3>>-
cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e168d-m2>>-
cpe:2.3:h:cisco:ucs-e168d-m2:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs-e180d-m3>>-
cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs_c125_m5>>-
cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs_c4200>>-
cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ucs_s3260>>-
cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE-78Secondaryykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1850ykramarz@cisco.com
Vendor Advisory
Change History
0Changes found

Details not found