Executive Summary
Summary | |
---|---|
Title | Cisco Elastic Services Controller REST API Authentication Bypass Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20190507-esc-authbypass | First vendor Publication | 2019-05-07 |
Vendor | Cisco | Last vendor Modification | 2019-05-07 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API. The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJc0a4RXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczmAcQALdgcj0VaHftNOhxzIokIKcpwS9K FCidVZs4/Vbe/vjzDMvdnjGOhfw2XMGC72aji3PVIEX+XN+ublHqBBHgwk325I50 72vjw6gIVhxH5wEfu2KJ14jFA5UOid61jAOzC3SSB9Ja5b6JJ8cwRyYXKCyhRvHV qImNyulNGdLsPhi2ldZPpkVuHPmHUe/YLKqBPaVNrxxwmURqW3VnYTlDq2vpR+hv UscuWGNKkaVzfuNNeRlgDE3A2dTXN/mGW2ZEHMcL3lPRgOl+YeDxRyx+LRniQkd9 4ekIgJX2FE7RMNZKTxU1F2ft8PyAyjjckgQdaQsfiyaaVlVogGq2j5Fu80NAnw6o x/eF6SJgVonRZVFG6G70bI0zGvO6s42pKhu5Vg8Xsuu6PQQdQo3VTiiy6khclkhP 1TRuEHQwm8cKkRncspccpftfj1asq4Sf5UmRwwuWunEW+jNIxB/OPGSMN6ySH5Gh 83xW8N4KaF2MbwuRnUQkZZViMeFdbu3CUk+SNFJYECV+hDR70N/pJt8wajmHA1xU mCqlyEUlS9xQx4n6YAGVcmjQT6gSHI2Nq/IQ7XMXrd+5wOsj4EC6SpgxHPuPkh+6 L3V2uYlwjCXY3n4lPOJGLAxf7oqc8v/GZ6mQtUG7rXHHy8l1N+S4ndbAeJ5RbEVn /Ml3Ah80fE5mTz1f =mcxm END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-287 | Improper Authentication |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco Elastic Services Controller authentication bypass attempt RuleID : 50037 - Revision : 1 - Type : SERVER-WEBAPP |
Alert History
Date | Informations |
---|---|
2020-12-05 21:23:46 |
|
2019-05-10 21:21:40 |
|
2019-05-10 17:21:20 |
|
2019-05-07 21:18:03 |
|