CVE-2019-1936
Summary
| CVE | CVE-2019-1936 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-08-21 19:15:00 UTC |
| Updated | 2023-03-03 14:45:00 UTC |
| Description | A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an authenticated, remote attacker to execute arbitrary commands on the underlying Linux shell as the root user. Exploitation of this vulnerability requires privileged access to an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by logging in to the web-based management interface with administrator privileges and then sending a malicious request to a certain part of the interface. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Integrated Management Controller Supervisor | 2.1.0.0 | All | All | All |
| Application | Cisco | Integrated Management Controller Supervisor | 2.1.0.0 | All | All | All |
| Application | Cisco | Integrated Management Controller Supervisor | All | All | All | All |
| Application | Cisco | Ucs Director | 6.0.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.5.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.6.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.6.1.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.7(0.0.67265) | All | All | All |
| Application | Cisco | Ucs Director | 6.7.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.7.1.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.7\(0.0.67265\) | All | All | All |
| Application | Cisco | Ucs Director | 6.0.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.5.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.6.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.6.1.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.7.0.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.7.1.0 | All | All | All |
| Application | Cisco | Ucs Director | 6.7\(0.0.67265\) | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.0.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.5.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.6.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.7.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.7.1.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.0.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.5.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.6.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.7.0.0 | All | All | All |
| Application | Cisco | Ucs Director Express For Big Data | 3.7.1.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco UCS Director Unauthenticated Remote Code Execution ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Cisco UCS / IMC Supervisor Authentication Bypass / Command Injection ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Full Disclosure: Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root | FULLDISC | seclists.org | |
| Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Command Injection Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| Bugtraq: Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root | BUGTRAQ | seclists.org | Exploit, Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.