CVE-2019-1880 (GCVE-0-2019-1880)

Vulnerability from cvelistv5 – Published: 2019-06-05 16:30 – Updated: 2024-11-21 19:22
VLAI?
Summary
A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/108680 vdb-entryx_refsource_BID
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System (Managed) Affected: unspecified , < 4.0(4c) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190605 Cisco Unified Computing System BIOS Signature Bypass Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass"
          },
          {
            "name": "108680",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108680"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1880",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:58:15.273798Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:22:52.735Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System (Managed)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "4.0(4c)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-06-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-345",
              "description": "CWE-345",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-07T10:06:02",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190605 Cisco Unified Computing System BIOS Signature Bypass Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass"
        },
        {
          "name": "108680",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108680"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190605-ucs-biossig-bypass",
        "defect": [
          [
            "CSCvp12824",
            "CSCvp12840"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Unified Computing System BIOS Signature Bypass Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-06-05T16:00:00-0700",
          "ID": "CVE-2019-1880",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Unified Computing System BIOS Signature Bypass Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System (Managed)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "4.0(4c)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "4.4",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-345"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190605 Cisco Unified Computing System BIOS Signature Bypass Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass"
            },
            {
              "name": "108680",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108680"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190605-ucs-biossig-bypass",
          "defect": [
            [
              "CSCvp12824",
              "CSCvp12840"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1880",
    "datePublished": "2019-06-05T16:30:23.473763Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:22:52.735Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.0\\\\(2g\\\\)\", \"matchCriteriaId\": \"C98B6DE4-8759-498A-93CC-B54376EAC099\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:unified_computing_system_c125_m5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E940DBA-1F06-479A-B697-0070174EB2F5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.0\\\\(4l\\\\)\", \"matchCriteriaId\": \"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.0\", \"versionEndExcluding\": \"4.0\\\\(2g\\\\)\", \"matchCriteriaId\": \"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:unified_computing_system_c220_m4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5502506-02DD-43C8-AED7-847C71AFBBBD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.0\\\\(4c\\\\)\", \"matchCriteriaId\": \"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:unified_computing_system_c220_m5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4221A779-1C3C-4EA5-980A-4F9BA206824C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.0\\\\(4l\\\\)\", \"matchCriteriaId\": \"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.0\", \"versionEndExcluding\": \"4.0\\\\(2g\\\\)\", \"matchCriteriaId\": \"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:unified_computing_system_c240_m4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"596E83E7-E11F-4BF7-AF79-C1A5805C0580\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.0\\\\(4c\\\\)\", \"matchCriteriaId\": \"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:unified_computing_system_c240_m5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A69A9518-AC5F-440D-A3F1-328035D3157C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.0\\\\(4l\\\\)\", \"matchCriteriaId\": \"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.0\", \"versionEndExcluding\": \"4.0\\\\(2g\\\\)\", \"matchCriteriaId\": \"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:unified_computing_system_c460_m4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"326CD3F6-3DC3-4840-811F-6ED353DC5F33\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.0\\\\(4c\\\\)\", \"matchCriteriaId\": \"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:unified_computing_system_c480_m5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51E29763-0766-4AEA-A434-37D48B6FAE08\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la utilidad de actualizaci\\u00f3n del BIOS de rack servidores Unified Computing System (UCS) C-Series de Cisco, podr\\u00eda permitir a un atacante local autorizado instalar el firmware del BIOS comprometido en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\\u00f3n insuficiente del archivo de imagen del firmware. Un atacante podr\\u00eda explotar esta vulnerabilidad mediante la ejecuci\\u00f3n de la utilidad de actualizaci\\u00f3n del BIOS con un conjunto espec\\u00edfico de opciones. Una operaci\\u00f3n  con \\u00e9xito podr\\u00eda permitir al atacante omitir el proceso de comprobaci\\u00f3n de firmas del firmware e instalar el firmware del BIOS comprometido en un dispositivo afectado.\"}]",
      "id": "CVE-2019-1880",
      "lastModified": "2024-11-21T04:37:36.150",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-06-05T17:29:00.647",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/108680\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/108680\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-345\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-345\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-1880\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2019-06-05T17:29:00.647\",\"lastModified\":\"2024-11-21T04:37:36.150\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la utilidad de actualizaci\u00f3n del BIOS de rack servidores Unified Computing System (UCS) C-Series de Cisco, podr\u00eda permitir a un atacante local autorizado instalar el firmware del BIOS comprometido en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente del archivo de imagen del firmware. Un atacante podr\u00eda explotar esta vulnerabilidad mediante la ejecuci\u00f3n de la utilidad de actualizaci\u00f3n del BIOS con un conjunto espec\u00edfico de opciones. Una operaci\u00f3n  con \u00e9xito podr\u00eda permitir al atacante omitir el proceso de comprobaci\u00f3n de firmas del firmware e instalar el firmware del BIOS comprometido en un dispositivo afectado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"C98B6DE4-8759-498A-93CC-B54376EAC099\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c125_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E940DBA-1F06-479A-B697-0070174EB2F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0\\\\(4l\\\\)\",\"matchCriteriaId\":\"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c220_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5502506-02DD-43C8-AED7-847C71AFBBBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(4c\\\\)\",\"matchCriteriaId\":\"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c220_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4221A779-1C3C-4EA5-980A-4F9BA206824C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0\\\\(4l\\\\)\",\"matchCriteriaId\":\"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c240_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596E83E7-E11F-4BF7-AF79-C1A5805C0580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(4c\\\\)\",\"matchCriteriaId\":\"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c240_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69A9518-AC5F-440D-A3F1-328035D3157C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0\\\\(4l\\\\)\",\"matchCriteriaId\":\"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c460_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326CD3F6-3DC3-4840-811F-6ED353DC5F33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(4c\\\\)\",\"matchCriteriaId\":\"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c480_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E29763-0766-4AEA-A434-37D48B6FAE08\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/108680\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/108680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…