Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-1937

Severity
9.8CRITICAL
EPSS
90.5%
top 0.39%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 21
Latest updateJul 15

Description

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDcisco/ucs_director_express3.7.0.03.7.1.0+1
CVEListV5cisco/cisco_unified_computing_system_directorunspecified6.7.3.0
NVDcisco/ucs_director6.6.0.06.6.1.0+2

🔴Vulnerability Details

2
GHSA
GHSA-6j24-rh4h-rq7f: A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Di2022-05-24
CVEList
Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability2019-08-21

💥Exploits & PoCs

2
Exploit-DB
Cisco UCS-IMC Supervisor 2.2.0.0 - Authentication Bypass2023-07-15
Metasploit
Cisco UCS Director Unauthenticated Remote Code Execution

📋Vendor Advisories

1
Cisco
Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Authentication Bypass Vulnerability2019-08-21
CVE-2019-1937 (CRITICAL CVSS 9.8) | A vulnerability in the web-based ma | cvebase.io