Executive Summary

Summary
TitleCisco Elastic Services Controller REST API Authentication Bypass Vulnerability
Informations
Namecisco-sa-20190507-esc-authbypassFirst vendor Publication2019-05-07
VendorCiscoLast vendor Modification2019-05-07
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API.

The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass"]

BEGIN PGP SIGNATURE

iQJ5BAEBAgBjBQJc0a4RXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczmAcQALdgcj0VaHftNOhxzIokIKcpwS9K FCidVZs4/Vbe/vjzDMvdnjGOhfw2XMGC72aji3PVIEX+XN+ublHqBBHgwk325I50 72vjw6gIVhxH5wEfu2KJ14jFA5UOid61jAOzC3SSB9Ja5b6JJ8cwRyYXKCyhRvHV qImNyulNGdLsPhi2ldZPpkVuHPmHUe/YLKqBPaVNrxxwmURqW3VnYTlDq2vpR+hv UscuWGNKkaVzfuNNeRlgDE3A2dTXN/mGW2ZEHMcL3lPRgOl+YeDxRyx+LRniQkd9 4ekIgJX2FE7RMNZKTxU1F2ft8PyAyjjckgQdaQsfiyaaVlVogGq2j5Fu80NAnw6o x/eF6SJgVonRZVFG6G70bI0zGvO6s42pKhu5Vg8Xsuu6PQQdQo3VTiiy6khclkhP 1TRuEHQwm8cKkRncspccpftfj1asq4Sf5UmRwwuWunEW+jNIxB/OPGSMN6ySH5Gh 83xW8N4KaF2MbwuRnUQkZZViMeFdbu3CUk+SNFJYECV+hDR70N/pJt8wajmHA1xU mCqlyEUlS9xQx4n6YAGVcmjQT6gSHI2Nq/IQ7XMXrd+5wOsj4EC6SpgxHPuPkh+6 L3V2uYlwjCXY3n4lPOJGLAxf7oqc8v/GZ6mQtUG7rXHHy8l1N+S4ndbAeJ5RbEVn /Ml3Ah80fE5mTz1f =mcxm END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

%idName
100 %CWE-287Improper Authentication

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-05-10 21:21:40
  • Multiple Updates
2019-05-10 17:21:20
  • Multiple Updates
2019-05-07 21:18:03
  • First insertion