// For flags

CVE-2018-15405

Cisco Integrated Management Controller Supervisor and Cisco UCS Director Authenticated Web Interface Information Disclosure Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web interface for specific feature sets of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to access sensitive information. The vulnerability is due to an authorization check that does not properly include the access level of the web interface user. An attacker who has valid application credentials could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to view sensitive information that belongs to other users. The attacker could then use this information to conduct additional reconnaissance attacks.

Una vulnerabilidad en la interfaz web para conjuntos de características específicas de Cisco Integrated Management Controller (IMC) Supervisor y Cisco UCS Director podría permitir que un atacante remoto autenticado acceda a información sensible. La vulnerabilidad se debe a una comprobación de autorización que no incluye debidamente el nivel de acceso del usuario de la interfaz web. Un atacante en posesión de credenciales válidas de la aplicación podría explotar esta vulnerabilidad mediante el envío de una petición HTTP manipulada a la interfaz web. Su explotación con éxito podría permitir que el atacante vea información sensible que pertenece a otros usuarios. Así, el atacante podría emplear esta información para llevar a cabo ataques de reconocimiento adicionales.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-17 CVE Reserved
  • 2018-10-05 CVE Published
  • 2024-07-18 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-285: Improper Authorization
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ucs Director
Search vendor "Cisco" for product "Ucs Director"
2.1\(0.0\)
Search vendor "Cisco" for product "Ucs Director" and version "2.1\(0.0\)"
-
Affected
Cisco
Search vendor "Cisco"
Ucs Director
Search vendor "Cisco" for product "Ucs Director"
6.6\(1.0\)
Search vendor "Cisco" for product "Ucs Director" and version "6.6\(1.0\)"
-
Affected