CVE-2019-1863

Current Description

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to make unauthorized changes to the system configuration. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow a user with read-only privileges to change critical system configurations using administrator privileges.

Basic Data

PublishedAugust 21, 2019
Last ModifiedOctober 09, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-285
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationSINGLE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score9.0
SeverityHIGH
Exploitability Score8.0
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorNETWORK
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score8.8
CVSS 3 - Base SeverityHIGH
Exploitability Score2.8
Base SeverityHIGH

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCiscoUnified Computing System4.0(1c)hs3*******
  • AND
    • OR - Configuration 2
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationCiscoIntegrated Management Controller Supervisor********1.5.0.01.5(9g)
      2.3ApplicationCiscoIntegrated Management Controller Supervisor********2.0.0.02.0(13o)
      2.3ApplicationCiscoIntegrated Management Controller Supervisor********3.0.0.03.0(4k)
      2.3ApplicationCiscoIntegrated Management Controller Supervisor********4.0.0.04.0(4b)
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareCiscoEncs 5100-*******
      2.3HardwareCiscoEncs 5400-*******
      2.3HardwareCiscoUcs-e1120d-m3-*******
      2.3HardwareCiscoUcs-e140s-m2-*******
      2.3HardwareCiscoUcs-e160d-m2-*******
      2.3HardwareCiscoUcs-e160s-m3-*******
      2.3HardwareCiscoUcs-e168d-m2-*******
      2.3HardwareCiscoUcs-e180d-m3-*******
      2.3HardwareCiscoUcs C125 M5-*******
      2.3HardwareCiscoUcs C4200-*******
      2.3HardwareCiscoUcs S3260-*******
  • AND
    • OR - Configuration 3
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationCiscoIntegrated Management Controller Supervisor********4.0.0.04.0(1d)
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareCiscoEncs 5100-*******
      2.3HardwareCiscoEncs 5400-*******
      2.3HardwareCiscoUcs-e1120d-m3-*******
      2.3HardwareCiscoUcs-e140s-m2-*******
      2.3HardwareCiscoUcs-e160d-m2-*******
      2.3HardwareCiscoUcs-e160s-m3-*******
      2.3HardwareCiscoUcs-e168d-m2-*******
      2.3HardwareCiscoUcs-e180d-m3-*******
      2.3HardwareCiscoUcs C125 M5-*******
      2.3HardwareCiscoUcs C4200-*******
      2.3HardwareCiscoUcs S3260-*******
  • AND
    • OR - Configuration 4
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationCiscoIntegrated Management Controller Supervisor********4.0.0.04.0(2c)
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareCiscoEncs 5100-*******
      2.3HardwareCiscoEncs 5400-*******
      2.3HardwareCiscoUcs-e1120d-m3-*******
      2.3HardwareCiscoUcs-e140s-m2-*******
      2.3HardwareCiscoUcs-e160d-m2-*******
      2.3HardwareCiscoUcs-e160s-m3-*******
      2.3HardwareCiscoUcs-e168d-m2-*******
      2.3HardwareCiscoUcs-e180d-m3-*******
      2.3HardwareCiscoUcs C125 M5-*******
      2.3HardwareCiscoUcs C4200-*******
      2.3HardwareCiscoUcs S3260-*******

Vulnerable Software List

VendorProductVersions
Cisco Integrated Management Controller Supervisor *
Cisco Unified Computing System 4.0(1c)hs3

References

NameSourceURLTags
20190821 Cisco Integrated Management Controller Privilege Escalation Vulnerabilityhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privilegCISCOVendor Advisory