Authentication bypass in Cisco 5000 Series ENCS and Cisco UCS E-Series Servers



Published: 2018-06-21
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-0362
CWE-ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Cisco Unified Computing E-Series Servers
Server applications / Web servers

Cisco 5000 Series Enterprise Network Compute System
Client/Desktop applications / Virtualization software

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Authentication bypass

EUVDB-ID: #VU13411

Risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0362

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a local unauthenticated attacker to bypass authentication on the target system.

The vulnerability exists in BIOS authentication management of Cisco 5000 Series Enterprise Network Compute System and Cisco Unified Computing (UCS) E-Series Servers due to improper security restrictions. A local attacker can submit an empty password value to an affected device's BIOS authentication prompt, bypass authentication and gain access to a restricted set of user-level BIOS commands.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Cisco Unified Computing E-Series Servers: 3.2.3

Cisco 5000 Series Enterprise Network Compute System: 3.2.3


CPE2.3 External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-encs-ucs-bio...

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###