The web interface in Cisco Integrated Management Controller in Cisco Unified Computing System (UCS) on C-Series Rack Servers does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCuf50138.
Max CVSS
4.3
EPSS Score
0.38%
Published
2015-02-03
Updated
2017-09-08
Cross-site request forgery (CSRF) vulnerability in the web framework in Cisco Integrated Management Controller in Cisco Unified Computing System allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuq45477.
Max CVSS
6.8
EPSS Score
0.20%
Published
2014-11-18
Updated
2017-09-08
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to cause a denial of service via crafted command parameters that trigger hardware-component write operations, aka Bug ID CSCtq86549.
Max CVSS
4.6
EPSS Score
0.04%
Published
2013-10-22
Updated
2013-10-22
The C-Series Rack Server component 1.4 in Cisco Unified Computing System (UCS) does not properly restrict inbound access to ports, which allows remote attackers to cause a denial of service (Integrated Management Controller reboot or hang) via crafted packets, as demonstrated by nmap, aka Bug ID CSCtx19850.
Max CVSS
5.0
EPSS Score
0.12%
Published
2013-08-02
Updated
2013-10-07
The high-availability service in the Fabric Interconnect component in Cisco Unified Computing System (UCS) does not properly bind the cluster service to the management interface, which allows remote attackers to obtain sensitive information or cause a denial of service (peer-syncing outage) via a TELNET connection, aka Bug ID CSCtz72910.
Max CVSS
6.8
EPSS Score
0.38%
Published
2013-10-03
Updated
2016-09-22
The fabric-interconnect component in Cisco Unified Computing System (UCS) does not properly verify X.509 certificates, which allows man-in-the-middle attackers to watch SSL KVM video-channel traffic or modify this traffic via a crafted certificate, aka Bug ID CSCtr73033.
Max CVSS
5.8
EPSS Score
0.08%
Published
2013-10-19
Updated
2013-10-21
The fabric-interconnect component in Cisco Unified Computing System (UCS) does not encrypt KVM media traffic, which allows remote attackers to obtain sensitive information, and consequently complete the authentication process for a server connection, by sniffing the network, aka Bug ID CSCtr72970.
Max CVSS
4.3
EPSS Score
0.15%
Published
2013-10-19
Updated
2013-10-21
The fabric-interconnect component in Cisco Unified Computing System (UCS) does not encrypt KVM virtual-media data, which allows man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify this traffic by inserting packets into the client-server data stream, aka Bug ID CSCtr72964.
Max CVSS
5.8
EPSS Score
0.10%
Published
2013-10-21
Updated
2013-10-21
The fabric-interconnect KVM module in Cisco Unified Computing System (UCS) does not encrypt video data, which allows man-in-the-middle attackers to watch KVM display content by sniffing the network or modify this traffic by inserting packets into the client-server data stream, aka Bug ID CSCtr72949.
Max CVSS
5.8
EPSS Score
0.10%
Published
2013-10-19
Updated
2013-10-21
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges and read arbitrary files via crafted command parameters within the command-line interface, aka Bug ID CSCtr43374.
Max CVSS
4.6
EPSS Score
0.04%
Published
2013-10-19
Updated
2013-10-21
The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary commands via crafted command parameters within the command-line interface, aka Bug ID CSCtr43330.
Max CVSS
6.8
EPSS Score
0.04%
Published
2013-10-19
Updated
2013-10-21
The create certreq command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86563.
Max CVSS
6.8
EPSS Score
0.04%
Published
2013-10-02
Updated
2013-10-03
run-script in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86560.
Max CVSS
6.8
EPSS Score
0.04%
Published
2013-10-02
Updated
2013-10-03
The clear sshkey command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86559.
Max CVSS
6.8
EPSS Score
0.04%
Published
2013-10-02
Updated
2013-10-03
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary operating-system commands via crafted parameters to a file-related command, aka Bug ID CSCtq86554.
Max CVSS
6.8
EPSS Score
0.04%
Published
2013-10-13
Updated
2013-10-15
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary commands via crafted parameters to a file-related command, aka Bug ID CSCtq86489.
Max CVSS
4.6
EPSS Score
0.04%
Published
2013-10-13
Updated
2016-09-22
The fabric-interconnect component in Cisco Unified Computing System (UCS) uses the same privilege level for execution of every script, which allows local users to gain privileges and execute arbitrary commands via an unspecified script-execution approach, aka Bug ID CSCtq86477.
Max CVSS
6.8
EPSS Score
0.04%
Published
2013-10-13
Updated
2016-09-22
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to cause a denial of service (component crash) via crafted "debug hardware" parameters, aka Bug ID CSCtq86468.
Max CVSS
4.6
EPSS Score
0.04%
Published
2013-10-13
Updated
2016-09-22
Absolute path traversal vulnerability in the image-download process in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to overwrite or delete arbitrary files via a full pathname in an image header, aka Bug ID CSCtq02706.
Max CVSS
6.6
EPSS Score
0.04%
Published
2013-10-02
Updated
2013-10-03
ethanalyzer in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq02686.
Max CVSS
6.8
EPSS Score
0.07%
Published
2013-10-02
Updated
2017-02-19
The activate firmware command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq02600.
Max CVSS
6.8
EPSS Score
0.04%
Published
2013-10-02
Updated
2013-10-03
The local file editor in the Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) allows local users to gain privileges and modify arbitrary fabric-interconnect files, in the context of a vi process, via unspecified commands, aka Bug ID CSCtn06574.
Max CVSS
6.2
EPSS Score
0.04%
Published
2013-10-01
Updated
2013-10-01
The local file editor in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges, and read or modify arbitrary files, via unspecified key bindings, aka Bug ID CSCtn04521.
Max CVSS
5.5
EPSS Score
0.06%
Published
2013-10-02
Updated
2016-09-22
Buffer overflow in the Smart Call Home feature in the fabric interconnect in Cisco Unified Computing System (UCS) allows remote attackers to cause a denial of service by reading and forging control messages associated with Smart Call Home reports, aka Bug ID CSCtl00198.
Max CVSS
5.4
EPSS Score
0.36%
Published
2013-09-24
Updated
2017-08-29
The Manager component in Cisco Unified Computing System (UCS) allows local users to cause a denial of service via an invalid Smart Call Home contact address, aka Bug ID CSCtl00186.
Max CVSS
4.6
EPSS Score
0.04%
Published
2013-09-20
Updated
2016-09-22
40 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!