ID

VAR-201908-0668


CVE

CVE-2019-1634


TITLE

Cisco Integrated Management Controller Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-008617

DESCRIPTION

A vulnerability in the Intelligent Platform Management Interface (IPMI) of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of user-supplied commands. An attacker who has administrator privileges and access to the network where the IPMI resides could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to gain root privileges on the affected device. Cisco Integrated Management Controller (IMC) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Integrated Management Controller (IMC) is a set of software used by Cisco to manage UCS (Unified Computing System). The software supports HTTP, SSH access, etc., and can perform operations such as starting, shutting down and restarting the server. The following products and versions are affected: Cisco UCS C-Series Servers (in single mode); Cisco UCS S-Series Servers (in single mode); UCS E-Series Servers; 5000 Series Enterprise Network Compute System (ENCS) Platforms

Trust: 1.71

sources: NVD: CVE-2019-1634 // JVNDB: JVNDB-2019-008617 // VULHUB: VHN-148476

AFFECTED PRODUCTS

vendor:ciscomodel:integrated management controller supervisorscope:gteversion:3.0.0.0

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:4.0\(1c\)hs3

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:gteversion:1.5.0.0

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:ltversion:4.0\(2f\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:ltversion:1.5\(9g\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:ltversion:4.0\(4b\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:ltversion:2.0\(13o\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:gteversion:4.0.0.0

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:ltversion:3.0\(4k\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:gteversion:2.0.0.0

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified computing system softwarescope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-008617 // NVD: CVE-2019-1634

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1634
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1634
value: HIGH

Trust: 1.0

NVD: CVE-2019-1634
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201908-1694
value: HIGH

Trust: 0.6

VULHUB: VHN-148476
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1634
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148476
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1634
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1634
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-148476 // JVNDB: JVNDB-2019-008617 // CNNVD: CNNVD-201908-1694 // NVD: CVE-2019-1634 // NVD: CVE-2019-1634

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-148476 // JVNDB: JVNDB-2019-008617 // NVD: CVE-2019-1634

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201908-1694

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201908-1694

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-008617

PATCH

title:cisco-sa-20190821-imc-cmdinject-1634url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1634

Trust: 0.8

title:Cisco Integrated Management Controller Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97292

Trust: 0.6

sources: JVNDB: JVNDB-2019-008617 // CNNVD: CNNVD-201908-1694

EXTERNAL IDS

db:NVDid:CVE-2019-1634

Trust: 2.5

db:JVNDBid:JVNDB-2019-008617

Trust: 0.8

db:CNNVDid:CNNVD-201908-1694

Trust: 0.7

db:AUSCERTid:ESB-2019.3212

Trust: 0.6

db:VULHUBid:VHN-148476

Trust: 0.1

sources: VULHUB: VHN-148476 // JVNDB: JVNDB-2019-008617 // CNNVD: CNNVD-201908-1694 // NVD: CVE-2019-1634

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190821-imc-cmdinject-1634

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-1634

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1634

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.3212/

Trust: 0.6

sources: VULHUB: VHN-148476 // JVNDB: JVNDB-2019-008617 // CNNVD: CNNVD-201908-1694 // NVD: CVE-2019-1634

SOURCES

db:VULHUBid:VHN-148476
db:JVNDBid:JVNDB-2019-008617
db:CNNVDid:CNNVD-201908-1694
db:NVDid:CVE-2019-1634

LAST UPDATE DATE

2024-08-14T13:26:01.477000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148476date:2020-10-16T00:00:00
db:JVNDBid:JVNDB-2019-008617date:2019-09-04T00:00:00
db:CNNVDid:CNNVD-201908-1694date:2020-01-20T00:00:00
db:NVDid:CVE-2019-1634date:2020-10-16T13:21:43.247

SOURCES RELEASE DATE

db:VULHUBid:VHN-148476date:2019-08-21T00:00:00
db:JVNDBid:JVNDB-2019-008617date:2019-09-04T00:00:00
db:CNNVDid:CNNVD-201908-1694date:2019-08-21T00:00:00
db:NVDid:CVE-2019-1634date:2019-08-21T19:15:14.043