Cisco UCS Director Authentication Bypass (cisco-sa-20190821-imcs-ucs-cmdinj)

high Nessus Plugin ID 129291

Synopsis

The remote host is affected by an authentication bypass vulnerability.

Description

According to its self-reported version, the remote host is running a version of Cisco UCS Director that is affected by a command execution vulnerability. An authenticated, remote attacker can exploit this to execute arbitrary commands as a root user.

Solution

Apply the patch or upgrade to the version recommended in Cisco bug ID CSCvp19245

See Also

https://tools.cisco.com/bugsearch/bug/CSCvp19245

http://www.nessus.org/u?c84fa5ca

Plugin Details

Severity: High

ID: 129291

File Name: cisco-sa-20190821-imcs-ucs-cmdinj.nasl

Version: 1.3

Type: combined

Family: CISCO

Published: 9/24/2019

Updated: 9/26/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2019-1936

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:ucs_director

Required KB Items: Host/Cisco/UCSDirector/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/21/2019

Vulnerability Publication Date: 8/21/2019

Exploitable With

Metasploit (Cisco UCS Director Unauthenticated Remote Code Execution)

Reference Information

CVE: CVE-2019-1936