目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2019-1634— Cisco Integrated Management Controller 操作系统命令注入漏洞

EPSS 1.53% · P81
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2019-1634の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Cisco Integrated Management Controller Command Injection Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
A vulnerability in the Intelligent Platform Management Interface (IPMI) of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of user-supplied commands. An attacker who has administrator privileges and access to the network where the IPMI resides could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to gain root privileges on the affected device.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Cisco Integrated Management Controller 操作系统命令注入漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Cisco Integrated Management Controller(IMC)是美国思科(Cisco)公司的一套用于对UCS(统一计算系统)进行管理的软件。该软件支持HTTP、SSH访问等,并可对服务器进行开机、关机和重启等操作。 Cisco IMC中的Intelligent Platform Management Interface存在操作系统命令注入漏洞,该漏洞源于程序没有充分过滤用户提交的命令。远程攻击者可通过提交特制的输入利用该漏洞获取root权限。以下产品及版本受到影响:Cisco UC
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
CiscoCisco Unified Computing System E-Series Software (UCSE) unspecified ~ 2.0(13o) -

II. CVE-2019-1634の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2019-1634のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Cisco · 2019-08-21 · 27 CVEs total

CVE-2019-1863Cisco Integrated Management Controller Privilege Escalation Vulnerability
CVE-2019-12623Cisco Enterprise Network Functions Virtualization Infrastructure Software File Enumeration
CVE-2019-12622Cisco RoomOS Software Privilege Escalation Vulnerability
CVE-2019-12621Cisco HyperFlex Static SSL Key Vulnerability
CVE-2019-12634Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Direc
CVE-2019-12627Cisco Firepower Threat Defense Software Information Disclosure Vulnerability
CVE-2019-12626Cisco Unified Contact Center Express Stored Cross-Site Scripting Vulnerability
CVE-2019-12624Cisco IOS XE NGWC Legacy Wireless Device Manager GUI Cross-Site Request Forgery Vulnerabil
CVE-2019-1850Cisco Integrated Management Controller Command Injection Vulnerability
CVE-2019-1839Cisco Remote PHY Device Software Command Injection Vulnerability
CVE-2019-1871Cisco Integrated Management Controller Buffer Overflow Vulnerability
CVE-2019-1865Cisco Integrated Management Controller Command Injection Vulnerability
CVE-2019-1864Cisco Integrated Management Controller Command Injection Vulnerability
CVE-2019-1938Cisco UCS Director and Cisco UCS Director Express for Big Data API Authentication Bypass V
CVE-2019-1900Cisco Integrated Management Controller Unauthenticated Denial of Service Vulnerability
CVE-2019-1896Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability
CVE-2019-1885Cisco Integrated Management Controller Command Injection Vulnerability
CVE-2019-1883Cisco Integrated Management Controller CLI Command Injection Vulnerability
CVE-2019-1937Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Direc
CVE-2019-1936Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Direc

Showing 20 of 27 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2019-1634へのコメント

まだコメントはありません


コメントを残す