A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to download system log files from an affected device. The vulnerability is due to an issue in the authentication logic of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web interface. A successful exploit could allow the attacker to download log files if they were previously generated by an administrator.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-ucs-dir-infodis | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2020-01-08T00:00:00
Updated: 2020-01-26T04:45:40
Reserved: 2019-09-06T00:00:00
Link: CVE-2019-16003
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-01-26T05:15:13.867
Modified: 2020-01-27T18:21:36.120
Link: CVE-2019-16003
JSON object: View
Redhat Information
No data.
CWE