CVE-2019-1974 (CNNVD-201908-1726)
中文标题:
Cisco Integrated Management Controller Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data 授权问题漏洞
英文标题:
Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability
漏洞描述
中文描述:
Cisco Integrated Management Controller(IMC)是美国思科(Cisco)公司的一套用于对UCS(统一计算系统)进行管理的软件。该软件支持HTTP、SSH访问等,并可对服务器进行开机、关机和重启等操作。 Cisco Integrated Management Controller (IMC) Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data中的Web管理界面存在授权问题漏洞,该漏洞源于在进行身份验证过程中,程序没有充分地验证请求头。远程攻击者可通过发送一系列恶意请求利用该漏洞获取受影响设备的全部管理访问权限。以下产品及版本受到影响:Cisco IMC Supervisor 2.1版本,2.2.0.0版本至2.2.0.6版本;Cisco UCS Director 5.5.0.0版本至5.5.0.2版本,6.0.0.0版本至6.0.1.3版本,6.5.0.0版本至6.5.0.3版本,6.6.0.0 版本,6.6.1.0版本,6.7.0.0版本至6.7.2.0版本;Cisco UCS Director Express for Big Data 2.1.0.0版本至2.1.0.2版本,3.0.0.0版本至3.0.1.3版本,3.5.0.0版本至3.5.0.3版本,3.6.0.0版本,3.6.1.0版本,3.7.0.0版本至3.7.2.0。
英文描述:
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to bypass user authentication and gain access as an administrative user. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to gain full administrative access to the affected device.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Unified Computing System Director | - | < 6.7.3.0 | - |
cpe:2.3:a:cisco:cisco_unified_computing_system_director:*:*:*:*:*:*:*:*
|
| cisco | integrated_management_controller_supervisor | * | - | - |
cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*
|
| cisco | integrated_management_controller_supervisor | 2.1.0.0 | - | - |
cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.1.0.0:*:*:*:*:*:*:*
|
| cisco | ucs_director | * | - | - |
cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*
|
| cisco | ucs_director | 6.7\(1.1\) | - | - |
cpe:2.3:a:cisco:ucs_director:6.7\(1.1\):*:*:*:*:*:*:*
|
| cisco | ucs_director | 6.7\(2.0\) | - | - |
cpe:2.3:a:cisco:ucs_director:6.7\(2.0\):*:*:*:*:*:*:*
|
| cisco | ucs_director_express_for_big_data | * | - | - |
cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:*
|
| cisco | ucs_director_express_for_big_data | 3.6.0.0 | - | - |
cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.6.0.0:*:*:*:*:*:*:*
|
| cisco | ucs_director_express_for_big_data | 3.6.1.0 | - | - |
cpe:2.3:a:cisco:ucs_director_express_for_big_data:3.6.1.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
CRITICALCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-1974 |
2025-11-11 15:20:09 | 2025-11-11 07:35:41 |
| NVD | nvd_CVE-2019-1974 |
2025-11-11 14:56:25 | 2025-11-11 07:44:12 |
| CNNVD | cnnvd_CNNVD-201908-1726 |
2025-11-11 15:10:16 | 2025-11-11 07:54:45 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201908-1726
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 9
- data_sources: ['cve'] -> ['cve', 'nvd']