{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1937","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","dateUpdated":"2024-09-16T22:52:10.450Z","dateReserved":"2018-12-06T00:00:00.000Z","datePublished":"2019-08-21T18:25:13.293Z"},"containers":{"cna":{"title":"Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability","datePublic":"2019-08-21T00:00:00.000Z","providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2023-07-17T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device."}],"affected":[{"vendor":"Cisco","product":"Cisco Unified Computing System Director","versions":[{"version":"unspecified","lessThan":"6.7.3.0","status":"affected","versionType":"custom"}]}],"references":[{"name":"20190821 Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability","tags":["vendor-advisory"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby"},{"name":"20190828 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root","tags":["mailing-list"],"url":"https://seclists.org/bugtraq/2019/Aug/49"},{"url":"http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html"},{"name":"20190830 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2019/Aug/36"},{"url":"http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html"},{"url":"http://packetstormsecurity.com/files/173531/Cisco-UCS-IMC-Supervisor-2.2.0.0-Authentication-Bypass.html"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287","cweId":"CWE-287"}]}],"source":{"advisory":"cisco-sa-20190821-imcs-ucs-authby","defect":[["CSCvp19229"]],"discovery":"INTERNAL"},"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T18:35:51.886Z"},"title":"CVE Program Container","references":[{"name":"20190821 Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability","tags":["vendor-advisory","x_transferred"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby"},{"name":"20190828 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root","tags":["mailing-list","x_transferred"],"url":"https://seclists.org/bugtraq/2019/Aug/49"},{"url":"http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html","tags":["x_transferred"]},{"name":"20190830 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2019/Aug/36"},{"url":"http://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/173531/Cisco-UCS-IMC-Supervisor-2.2.0.0-Authentication-Bypass.html","tags":["x_transferred"]}]}]}}