CVE-2019-1937 (CNNVD-201908-1723)
中文标题:
Cisco Integrated Management Controller Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data 授权问题漏洞
英文标题:
Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability
漏洞描述
中文描述:
Cisco Integrated Management Controller (IMC) Supervisor等都是美国思科(Cisco)公司的产品。Cisco Integrated Management Controller (IMC) Supervisor是一套机架式服务器集中管理系统。Cisco UCS Director是一套私有云基础架构即服务(IaaS)的异构平台。Cisco UCS Director Express for Big Data是一套针对大数据集群的基础架构统一管理平台。 Cisco Integrated Management Controller (IMC) Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data中的Web管理界面存在授权问题漏洞,该漏洞源于在身份验证过程中,程序没有充分验证请求头。 远程攻击者可通过发送恶意的请求利用该漏洞获取有效的会话令牌,获取受影响设备的全部管理员权限。以下产品及版本受到影响:Cisco IMC Supervisor 2.2.0.3版本至2.2.0.6版本;Cisco UCS Director 6.6.0.0版本,6.6.1.0版本,6.7.0.0版本,6.7.1.0版本;Cisco UCS Director Express for Big Data 3.6版本,3.7.0.0版本,3.7.1.0版本。
英文描述:
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Unified Computing System Director | - | < 6.7.3.0 | - |
cpe:2.3:a:cisco:cisco_unified_computing_system_director:*:*:*:*:*:*:*:*
|
| cisco | integrated_management_controller_supervisor | * | - | - |
cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*
|
| cisco | ucs_director | * | - | - |
cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*
|
| cisco | ucs_director | 6.7\(0.0.67265\) | - | - |
cpe:2.3:a:cisco:ucs_director:6.7\(0.0.67265\):*:*:*:*:*:*:*
|
| cisco | ucs_director_express_for_big_data | * | - | - |
cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:*
|
| cisco | ucs_director_express_for_big_data | 3.6.0.0 | - | - |
cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.6.0.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
3.0 (cna)
CRITICALCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-1937 |
2025-11-11 15:20:09 | 2025-11-11 07:35:41 |
| NVD | nvd_CVE-2019-1937 |
2025-11-11 14:56:25 | 2025-11-11 07:44:11 |
| CNNVD | cnnvd_CNNVD-201908-1723 |
2025-11-11 15:10:15 | 2025-11-11 07:54:45 |
| EXPLOITDB | exploitdb_EDB-51589 |
2025-11-11 15:05:22 | 2025-11-11 09:01:19 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 6 -> 9
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201908-1723
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 6
- data_sources: ['cve'] -> ['cve', 'nvd']