CVE编号
CVE-2019-1974利用情况
暂无补丁情况
N/A披露时间
2019-08-22漏洞描述
Cisco Integrated Management Controller(IMC)是美国思科(Cisco)公司的一套用于对UCS(统一计算系统)进行管理的软件。该软件支持HTTP、SSH访问等,并可对服务器进行开机、关机和重启等操作。 Cisco Integrated Management Controller (IMC) Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data中的Web管理界面存在授权问题漏洞,该漏洞源于在进行身份验证过程中,程序没有充分地验证请求头。远程攻击者可通过发送一系列恶意请求利用该漏洞获取受影响设备的全部管理访问权限。以下产品及版本受到影响:Cisco IMC Supervisor 2.1版本,2.2.0.0版本至2.2.0.6版本;Cisco UCS Director 5.5.0.0版本至5.5.0.2版本,6.0.0.0版本至6.0.1.3版本,6.5.0.0版本至6.5.0.3版本,6.6.0.0 版本,6.6.1.0版本,6.7.0.0版本至6.7.2.0版本;Cisco UCS Director Express for Big Data 2.1.0.0版本至2.1.0.2版本,3.0.0.0版本至3.0.1.3版本,3.5.0.0版本至3.5.0.3版本,3.6.0.0版本,3.6.1.0版本,3.7.0.0版本至3.7.2.0。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authbypass
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | integrated_management_controller_supervisor | * |
From (including) 2.2.0.0 |
Up to (including) 2.2.0.6 |
||||
运行在以下环境 | |||||||||
应用 | cisco | integrated_management_controller_supervisor | 2.1.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director | * |
From (including) 5.5.0.0 |
Up to (including) 5.5.0.2 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director | * |
From (including) 6.0.0.0 |
Up to (including) 6.0.1.3 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director | * |
From (including) 6.5.0.0 |
Up to (including) 6.5.0.3 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director | * |
From (including) 6.6.0.0 |
Up to (including) 6.6.1.0 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director | * |
From (including) 6.7.0.0 |
Up to (including) 6.7.2.0 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director | 6.7(1.1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director | 6.7(2.0) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director_express_for_big_data | * |
From (including) 2.1.0.0 |
Up to (including) 2.1.0.2 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director_express_for_big_data | * |
From (including) 3.0.0.0 |
Up to (including) 3.0.1.3 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director_express_for_big_data | * |
From (including) 3.5.0.0 |
Up to (including) 3.5.0.3 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director_express_for_big_data | * |
From (including) 3.7.0.0 |
Up to (including) 3.7.2.0 |
||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director_express_for_big_data | 3.6.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | ucs_director_express_for_big_data | 3.6.1.0 | - | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | fig2dev | * |
Up to (excluding) 3.2.7b-2.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | fig2dev | * |
Up to (excluding) 1:3.2.7a-5+deb10u3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | fig2dev | * |
Up to (excluding) 3.2.6a-2+deb9u3 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | fig2dev | * |
Up to (excluding) 3.2.7b-1.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | fig2dev | * |
Up to (excluding) 3.2.7b-1.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | transfig | * |
Up to (excluding) 3.2.8a-lp152.6.6.2 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | transfig | * |
Up to (excluding) 3.2.8a-bp153.3.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | transfig | * |
Up to (excluding) 3.2.8a-2.17.1 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...