Vulnerability identifier: #VU10693
Vulnerability risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-352
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco UCS Director
Server applications /
Other server solutions
Cisco Integrated Management Controller
Server applications /
Remote management servers, RDP, SSH
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote unauthenticated attacker to perform CSRF attack.
The weakness exists due to insufficient CSRF protection by the web-based management interface. A remote attacker can create a specially crafted HTML page or URL, trick the victim into visiting it, gain access to the system and perform arbitrary actions.
Mitigation
Update to version 6.6(0.0).
Vulnerable software versions
Cisco UCS Director: 6.5.0.0.65832
Cisco Integrated Management Controller: All versions
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-ucsd
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.