The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Cisco UCS

vulnerability alert CVE-2019-1808 CVE-2019-1809 CVE-2019-1810

Cisco Nexus: multiple vulnerabilities via signature

Synthesis of the vulnerability

An attacker can use several vulnerabilities via signature of Cisco Nexus.
Impacted products: Nexus by Cisco, NX-OS, Cisco UCS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: privileged account.
Number of vulnerabilities in this bulletin: 6.
Creation date: 16/05/2019.
Identifiers: cisco-sa-20190515-nxos-psvb, cisco-sa-20190515-nxos-sisv, cisco-sa-20190515-nxos-sisv2, cisco-sa-20190515-nxos-spsv, CVE-2019-1808, CVE-2019-1809, CVE-2019-1810, CVE-2019-1811, CVE-2019-1812, CVE-2019-1813, VIGILANCE-VUL-29341.

Description of the vulnerability

An attacker can use several vulnerabilities via signature of Cisco Nexus.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-1776

Cisco NX-OS: privilege escalation via CLI

Synthesis of the vulnerability

An attacker can bypass restrictions via CLI of Cisco NX-OS, in order to escalate his privileges.
Impacted products: Nexus by Cisco, NX-OS, Cisco UCS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user console.
Creation date: 16/05/2019.
Identifiers: cisco-sa-20190515-nxos-cmdinj-1776, CVE-2019-1776, VIGILANCE-VUL-29338.

Description of the vulnerability

An attacker can bypass restrictions via CLI of Cisco NX-OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-1735

Cisco NX-OS: shell command execution

Synthesis of the vulnerability

An attacker can use a vulnerability of Cisco NX-OS, in order to run code.
Impacted products: Nexus by Cisco, NX-OS, Cisco UCS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user console.
Creation date: 16/05/2019.
Identifiers: cisco-sa-20190515-nxos-cmdinj-1735, CVE-2019-1735, VIGILANCE-VUL-29333.

Description of the vulnerability

An attacker can use a vulnerability of Cisco NX-OS, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-1728

Cisco NX-OS: code execution at boot time

Synthesis of the vulnerability

A local attacker can use a vulnerability of Cisco NX-OS at boot time, in order to run code.
Impacted products: Nexus by Cisco, NX-OS, Cisco UCS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: physical access.
Creation date: 16/05/2019.
Identifiers: cisco-sa-20190515-nxos-conf-bypass, CVE-2019-1728, VIGILANCE-VUL-29327.

Description of the vulnerability

A local attacker can use a vulnerability of Cisco NX-OS at boot time, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2019-1726

Cisco NX-OS: privilege escalation via the shell

Synthesis of the vulnerability

A local authenticated attacker can bypass restrictions via shell of Cisco NX-OS, in order to escalate his privileges.
Impacted products: Nexus by Cisco, NX-OS, Cisco UCS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user console.
Creation date: 16/05/2019.
Identifiers: cisco-sa-20190515-nxos-cli-bypass, CVE-2019-1726, VIGILANCE-VUL-29325.

Description of the vulnerability

A local authenticated attacker can bypass restrictions via shell of Cisco NX-OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-1725

Cisco UCS B-Series Blade Servers: privilege escalation via CLI

Synthesis of the vulnerability

An attacker can bypass restrictions via CLI of Cisco UCS B-Series Blade Servers, in order to escalate his privileges.
Impacted products: Cisco UCS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, data creation/edition.
Provenance: document.
Creation date: 18/04/2019.
Identifiers: cisco-sa-20190417-ucs-cli-inj, CSCvm86205, CSCvn00552, CVE-2019-1725, VIGILANCE-VUL-29087.

Description of the vulnerability

An attacker can bypass restrictions via CLI of Cisco UCS B-Series Blade Servers, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-15406

Cisco UCS Director: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Cisco UCS Director, in order to run JavaScript code in the context of the web site.
Impacted products: Cisco UCS.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 04/10/2018.
Identifiers: CERTFR-2018-AVI-468, cisco-sa-20181003-ucsd-xss, CSCvj95427, CVE-2018-15406, VIGILANCE-VUL-27409.

Description of the vulnerability

An attacker can trigger a Cross Site Scripting of Cisco UCS Director, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-15405

Cisco UCS Director: information disclosure via Web Interface

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Web Interface of Cisco UCS Director, in order to obtain sensitive information.
Impacted products: Cisco UCS.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 04/10/2018.
Identifiers: CERTFR-2018-AVI-468, cisco-sa-20181003-imcs-ucsd-id, CSCvj95420, CSCvk10260, CVE-2018-15405, VIGILANCE-VUL-27403.

Description of the vulnerability

An attacker can bypass access restrictions to data via Web Interface of Cisco UCS Director, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2018-15404

Cisco UCS Director: denial of service via Web Interface

Synthesis of the vulnerability

An attacker can generate a fatal error via Web Interface of Cisco UCS Director, in order to trigger a denial of service.
Impacted products: Cisco UCS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user account.
Creation date: 04/10/2018.
Identifiers: CERTFR-2018-AVI-468, cisco-sa-20181003-imcs-ucsd-dos, CSCvj95431, CSCvk10284, CVE-2018-15404, VIGILANCE-VUL-27402.

Description of the vulnerability

An attacker can generate a fatal error via Web Interface of Cisco UCS Director, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-5391

Linux kernel: denial of service via FragmentSmack

Synthesis of the vulnerability

An attacker can generate a fatal error via FragmentSmack of the Linux kernel, in order to trigger a denial of service.
Impacted products: GAiA, SecurePlatform, CheckPoint Security Gateway, Cisco Aironet, IOS XE Cisco, Nexus by Cisco, Prime Collaboration Assurance, Prime Infrastructure, Cisco Router, Secure ACS, Cisco CUCM, Cisco UCS, Cisco Unified CCX, Cisco IP Phone, Cisco Wireless Controller, Debian, BIG-IP Hardware, TMOS, Junos Space, Linux, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, openSUSE Leap, Palo Alto Firewall PA***, PAN-OS, RHEL, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, ProxySG by Symantec, Synology DSM, Ubuntu.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet client.
Creation date: 16/08/2018.
Identifiers: ADV180022, CERTFR-2018-AVI-390, CERTFR-2018-AVI-392, CERTFR-2018-AVI-419, CERTFR-2018-AVI-457, CERTFR-2018-AVI-478, CERTFR-2018-AVI-533, CERTFR-2019-AVI-233, CERTFR-2019-AVI-242, cisco-sa-20180824-linux-ip-fragment, CVE-2018-5391, DLA-1466-1, DLA-1529-1, DSA-2019-062, DSA-4272-1, FragmentSmack, JSA10917, K74374841, openSUSE-SU-2018:2404-1, openSUSE-SU-2018:2407-1, openSUSE-SU-2019:0274-1, PAN-SA-2018-0012, RHSA-2018:2785-01, RHSA-2018:2791-01, RHSA-2018:2846-01, RHSA-2018:2924-01, RHSA-2018:2925-01, RHSA-2018:2933-01, RHSA-2018:2948-01, RHSA-2018:3083-01, RHSA-2018:3096-01, RHSA-2018:3459-01, RHSA-2018:3540-01, RHSA-2018:3586-01, RHSA-2018:3590-01, sk134253, SUSE-SU-2018:2344-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2380-1, SUSE-SU-2018:2381-1, SUSE-SU-2018:2596-1, SUSE-SU-2019:0541-1, SUSE-SU-2019:1289-1, SYMSA1467, Synology-SA-18:44, USN-3740-1, USN-3740-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, VIGILANCE-VUL-27009, VU#641765.

Description of the vulnerability

An attacker can generate a fatal error via FragmentSmack of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Cisco UCS: