CVE编号
CVE-2021-34736利用情况
暂无补丁情况
N/A披露时间
2021-10-21漏洞描述
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to cause the web-based management interface to unexpectedly restart. The vulnerability is due to insufficient input validation on the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause the interface to restart, resulting in a denial of service (DoS) condition.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | unified_computing_system | * |
Up to (excluding) 4.1\(2g\) |
|||||
运行在以下环境 | |||||||||
应用 | cisco | unified_computing_system | * |
Up to (excluding) 4.1\(3e\) |
|||||
运行在以下环境 | |||||||||
应用 | cisco | unified_computing_system | * |
From (including) 4.2 |
Up to (excluding) 4.2\(1b\) |
||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c125_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c220_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c220_m4 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c220_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c225_m6 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c22_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c240_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c240_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c240_sd_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c245_m6 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c24_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c260_m2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c3160 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c3260 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c4200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c420_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c460_m2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c460_m4 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c480_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c480_ml_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c890_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_s3260 | - | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...