Executive Summary

Summary
Title Cisco Elastic Services Controller REST API Authentication Bypass Vulnerability
Informations
Name cisco-sa-20190507-esc-authbypass First vendor Publication 2019-05-07
Vendor Cisco Last vendor Modification 2019-05-07
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API.

The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass"]

BEGIN PGP SIGNATURE

iQJ5BAEBAgBjBQJc0a4RXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczmAcQALdgcj0VaHftNOhxzIokIKcpwS9K FCidVZs4/Vbe/vjzDMvdnjGOhfw2XMGC72aji3PVIEX+XN+ublHqBBHgwk325I50 72vjw6gIVhxH5wEfu2KJ14jFA5UOid61jAOzC3SSB9Ja5b6JJ8cwRyYXKCyhRvHV qImNyulNGdLsPhi2ldZPpkVuHPmHUe/YLKqBPaVNrxxwmURqW3VnYTlDq2vpR+hv UscuWGNKkaVzfuNNeRlgDE3A2dTXN/mGW2ZEHMcL3lPRgOl+YeDxRyx+LRniQkd9 4ekIgJX2FE7RMNZKTxU1F2ft8PyAyjjckgQdaQsfiyaaVlVogGq2j5Fu80NAnw6o x/eF6SJgVonRZVFG6G70bI0zGvO6s42pKhu5Vg8Xsuu6PQQdQo3VTiiy6khclkhP 1TRuEHQwm8cKkRncspccpftfj1asq4Sf5UmRwwuWunEW+jNIxB/OPGSMN6ySH5Gh 83xW8N4KaF2MbwuRnUQkZZViMeFdbu3CUk+SNFJYECV+hDR70N/pJt8wajmHA1xU mCqlyEUlS9xQx4n6YAGVcmjQT6gSHI2Nq/IQ7XMXrd+5wOsj4EC6SpgxHPuPkh+6 L3V2uYlwjCXY3n4lPOJGLAxf7oqc8v/GZ6mQtUG7rXHHy8l1N+S4ndbAeJ5RbEVn /Ml3Ah80fE5mTz1f =mcxm END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 15

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2019-05-10 21:21:40
  • Multiple Updates
2019-05-10 17:21:20
  • Multiple Updates
2019-05-07 21:18:03
  • First insertion