Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Integrated_management_controller
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 12 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-11-06 | CVE-2020-3371 | A vulnerability in the web UI of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary code and execute arbitrary commands at the underlying operating system level. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary... | Integrated_management_controller | 8.8 | ||
2020-11-18 | CVE-2020-3470 | Multiple vulnerabilities in the API subsystem of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges. The vulnerabilities are due to improper boundary checks for certain user-supplied input. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the API subsystem of an affected system. When this request is processed, an exploitable buffer overflow condition may occur. A... | Enterprise_nfv_infrastructure_software, Integrated_management_controller | 9.8 | ||
2021-05-06 | CVE-2021-1397 | A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability... | C125_m5_firmware, C220_m5_firmware, C220_m6_firmware, C225_m6_firmware, C240_m5_firmware, C240_m6_firmware, C245_m6_firmware, C480_m5_firmware, C480_ml_m5_firmware, Encs_5100_firmware, Encs_5400_firmware, Integrated_management_controller, Ucs\-E1120d\-M3_firmware, Ucs\-E140d_firmware, Ucs\-E140dp_firmware, Ucs\-E140s\-M1_firmware, Ucs\-E140s\-M2_firmware, Ucs\-E140s_firmware, Ucs\-E160d_firmware, Ucs\-E160dp\-M1_firmware, Ucs\-E160s\-M3_firmware, Ucs\-E180d\-M2_firmware, Ucs\-E180d\-M3_firmware, Ucs_manager, Ucs_s3260_firmware | 6.1 | ||
2019-06-20 | CVE-2019-1628 | A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checking. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. An exploit could allow the attacker to cause a buffer overflow, resulting in a process crash and DoS condition... | Integrated_management_controller, Unified_computing_system | 5.5 | ||
2019-06-20 | CVE-2019-1632 | A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user to follow a malicious link. A successful exploit could... | Integrated_management_controller, Unified_computing_system | 8.0 | ||
2019-06-20 | CVE-2019-1631 | A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to access potentially sensitive system usage information. The vulnerability is due to a lack of proper data protection mechanisms. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow an attacker to view sensitive system data. | Integrated_management_controller, Unified_computing_system | 5.3 | ||
2019-06-20 | CVE-2019-1630 | A vulnerability in the firmware signature checking program of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient checking of an input buffer. An attacker could exploit this vulnerability by passing a crafted file to the affected system. A successful exploit could inhibit an administrator's ability to access the system. | Integrated_management_controller, Unified_computing_system | 5.5 | ||
2019-06-20 | CVE-2019-1629 | A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily uploaded files. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the affected device. An exploit could allow the attacker to fill up the filesystem or upload malicious scripts. | Integrated_management_controller, Unified_computing_system | 5.3 | ||
2019-06-20 | CVE-2019-1627 | A vulnerability in the Server Utilities of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to gain unauthorized access to sensitive user information from the configuration data that is stored on the affected system. The vulnerability is due to insufficient protection of data in the configuration file. An attacker could exploit this vulnerability by downloading the configuration file. An exploit could allow the attacker to use the sensitive... | Integrated_management_controller, Unified_computing_system | 6.5 | ||
2018-11-08 | CVE-2018-15447 | A vulnerability in the web framework code of Cisco Integrated Management Controller (IMC) Supervisor could allow an unauthenticated, remote attacker to execute arbitrary SQL queries. The vulnerability is due to a lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected application. | Integrated_management_controller | 9.8 |