#VU13411 Authentication bypass in Cisco Unified Computing E-Series Servers and Cisco 5000 Series Enterprise Network Compute System


Published: 2018-06-20 | Updated: 2018-06-21

Vulnerability identifier: #VU13411

Vulnerability risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0362

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Cisco Unified Computing E-Series Servers
Server applications / Web servers
Cisco 5000 Series Enterprise Network Compute System
Client/Desktop applications / Virtualization software

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a local unauthenticated attacker to bypass authentication on the target system.

The vulnerability exists in BIOS authentication management of Cisco 5000 Series Enterprise Network Compute System and Cisco Unified Computing (UCS) E-Series Servers due to improper security restrictions. A local attacker can submit an empty password value to an affected device's BIOS authentication prompt, bypass authentication and gain access to a restricted set of user-level BIOS commands.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Cisco Unified Computing E-Series Servers: 3.2.3

Cisco 5000 Series Enterprise Network Compute System: 3.2.3


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-encs-ucs-bio...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability